WO2013075430A1 - Information filtering method, and method, device, and system for processing forwarded information - Google Patents

Information filtering method, and method, device, and system for processing forwarded information Download PDF

Info

Publication number
WO2013075430A1
WO2013075430A1 PCT/CN2012/072319 CN2012072319W WO2013075430A1 WO 2013075430 A1 WO2013075430 A1 WO 2013075430A1 CN 2012072319 W CN2012072319 W CN 2012072319W WO 2013075430 A1 WO2013075430 A1 WO 2013075430A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
client
setting information
network information
spam
Prior art date
Application number
PCT/CN2012/072319
Other languages
French (fr)
Chinese (zh)
Inventor
陈军
陶伟成
姚立哲
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2013075430A1 publication Critical patent/WO2013075430A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Definitions

  • the present invention relates to the field of communications, and in particular to a method for filtering information, a method, a device, and a system for processing forwarding information.
  • Background Art With the rapid development of information and communication technologies, various terminals can transmit various information in the network anytime and anywhere.
  • spam is also coming.
  • These spam messages include various erotic videos, pictures, literature and other "vulgar content", gambling, fraud, fraud and other content that violates ethics, laws and regulations, and embarrassing and bad evaluations of other online users. This information not only plagues the lives of the broad masses of the people, but also causes people's spiritual losses. Therefore, it is imperative to solve the problem of spam in the network.
  • the main strategy of the former is: the user records the body of the spam in advance (such as the initiator of spam) and puts it in the restricted list, but this method occurs after the spam has been successfully sent and may need to be received. The party feedbacks the corresponding information to determine that the information is spam.
  • the blacklist of a single user is often incomplete, there is no ability to process the changed spam subject.
  • the latter's main strategy is: Pre-establish a feature database of spam, extract the keywords or features in the information when new information is received, and compare the keyword or feature with the feature database to determine Whether this information is spam or not, the shortcoming of this method is that the accuracy is not high, it is easy to cause misjudgment and the efficiency is relatively low. In view of the low efficiency of filtering spam in the related art, an effective solution has not yet been proposed.
  • the present invention provides a method for information filtering, a method, device, and system for processing forwarding information to at least solve the problem of low efficiency of filtering spam in the related art.
  • a method for filtering information comprising: obtaining, by a client, setting information of a third party intercepting spam, the third party being one or more devices other than the client; Updating the locally stored setting information according to the setting information; when the client receives the network information, the client filters the network information by using the updated setting information.
  • the other one or more of the above devices are servers or designated clients.
  • the above setting information includes: blacklist and/or spam processing rules.
  • the client uses the updated setting information to filter the network information, including: the client detects whether the sender of the network information is in the blacklist, and if yes, determines the network information.
  • the client detects whether there is a keyword matching the spam processing rule in the network information; if there is a matching keyword, the client determines that the network information is spam.
  • the method further includes: adding, by the sender or the server, the sender identifier and the original sender identifier of the network information in the information header of the network information;
  • the above-mentioned client uses the updated setting information to filter the network information, including: when the client receives the network information forwarded by the sender, the setting information stored locally by the client is used in the information header of the network information.
  • the sender ID and the original sender ID are filtered.
  • a method for information filtering including: receiving, by a server, a request message for acquiring setting information from a client; and adding, by the server, setting information of the third party intercepting the spam information to a client local to the server The storage area; wherein, the third party is one or more devices other than the client; when the server forwards the network information to the client, the network information is filtered by using the setting information in the storage area.
  • the request message is configured to specify the setting information of the client.
  • the server adds the setting information of the third party intercepting the spam to the storage area corresponding to the client local to the server.
  • the server searches for the setting information corresponding to the specified client locally on the server, and the found information is found.
  • the setting information is added to the storage area corresponding to the client local to the server.
  • the above setting information includes: blacklist and/or spam processing rules.
  • the server uses the setting information in the storage area to filter the network information, including: the server detects whether the sender of the network information is in the blacklist, and if yes, determines that the network information is spam. If not, the server detects whether there is a keyword matching the spam processing rule in the network information; if there is a matching keyword, the server determines that the network information is spam.
  • the network information is information forwarded by the forwarding party, the network information carries the identifier of the forwarder and the identifier of the original sender.
  • the server uses the setting information in the storage area to filter the network information, including: the server detects the identifier of the forwarder. And/or whether the identifier of the original sender is in the setting information; if one of the identifier of the forwarder and the identifier of the original sender is in the setting information, it is determined that the network information is spam.
  • a client device for information filtering includes: an obtaining module configured to acquire setting information of a third party intercepting spam information; and a storage module configured to store the setting information Locally; the filtering module is configured to filter the network information by using the above-mentioned setting information stored locally when receiving the network information.
  • the obtaining module further includes: a third obtaining unit, configured to obtain a blacklist and/or spam processing rule for the third party to intercept the spam, and use the blacklist and/or the spam processing rule as the setting information of the spam.
  • a server for information filtering comprising: a request message receiving module, configured to receive a request message for acquiring setting information from a client; a first setting information adding module, configured to be The setting information of the three-party interception spam is added to the storage area corresponding to the local client; and the filtering module is configured to filter the network information by using the setting information in the storage area when the network information is forwarded to the client.
  • the request message receiving module includes: a request message receiving unit, configured to receive a request message that the obtaining setting information from the client is a blacklist and/or a spam processing rule.
  • the filtering module includes: a detecting unit configured to: the network information is information forwarded by the forwarding party, and the network information carries the identifier of the forwarding party and the identifier of the original sender, and detects the identifier of the forwarding party and/or the original sender. Whether the identifier is in the setting information; the determining unit is configured to determine that the network information is spam in the case that one of the identifier of the forwarding party and the identifier of the original sender is in the setting information.
  • a method for processing forwarding information including: when a sending direction forwards network information to a receiving party, the sender or the server adds the sender identifier and the original sender identifier of the network information to In the information header of the network information, the network information is forwarded; when receiving the network information forwarded by the sender, the receiver uses the setting information stored locally by the receiver to use the sender identifier and the original sender in the header of the network information.
  • the logo is filtered.
  • a processing system for forwarding information includes: a sender device and a receiver device; wherein the sender device includes: an identifier adding module configured to forward network information to the receiver device Adding the sender identifier corresponding to the sender device and the original sender identifier of the network information to the information header of the network information; the forwarding module is configured to forward the network information after the identifier adding module adds the identifier to the receiver device;
  • the receiving device includes: a receiving module configured to receive network information forwarded from the transmitting device; and a filtering module configured to send the information in the header of the network information received by the receiving module using the setting information stored locally by the receiving device The party ID and the original sender ID are filtered.
  • the network information is filtered according to the setting information of the third party intercepting the spam information, the garbage information can be excluded more accurately, the update speed of the local setting information is accelerated, and the problem of low efficiency of filtering the spam in the related technology is solved. And improve the success rate of filtering spam, thus improving user experience.
  • FIG. 1 is a flowchart of a method for information filtering according to an embodiment of the present invention
  • FIG. 2 is a flow chart of storing an extended blacklist locally according to an embodiment of the present invention
  • FIG. 3 is a flowchart according to an embodiment of the present invention.
  • FIG. 4 is a flow chart of an extended blacklist stored in a server according to an embodiment of the present invention
  • FIG. 5 is a structural block diagram of a client device for information filtering according to an embodiment of the present invention
  • FIG. 6 is another structural block diagram of a client device for information filtering according to an embodiment of the present invention
  • FIG. 7 is a block diagram showing another structure of a client device for information filtering according to an embodiment of the present invention.
  • FIG. 9 is a block diagram showing another structure of a server for information filtering according to an embodiment of the present invention
  • FIG. 10 is a block diagram showing another structure of a server for information filtering according to an embodiment of the present invention
  • Figure 11 is a flowchart of a method for information filtering according to a first embodiment of the present invention
  • Figure 12 is a method for filtering information according to a second embodiment of the present invention
  • FIG. 13 is a flowchart of a method for information filtering according to Embodiment 3 of the present invention
  • FIG. 14 is a flowchart of a method for information filtering according to Embodiment 4 of the present invention
  • FIG. 15 is a flowchart according to an embodiment of the present invention
  • a block diagram of the processing system for information is a block diagram showing another structure of a server for information filtering according to an embodiment of the present invention
  • FIG. 10 is a block diagram showing another structure of a server for information filtering according to an embodiment of the present invention
  • Figure 11 is
  • the embodiment of the present invention considers a method for filtering spam based on a user's own blacklist or filtering rule (also referred to as a spam processing rule), which is easy to cause misjudgment and has low efficiency of filtering spam, and provides a kind of Method of information filtering, processing method of forwarding information, devices (such as client devices and servers), and systems. The details will be described below by way of examples.
  • the embodiment provides a method for filtering information, which can be implemented on the client, as shown in the flowchart of the information filtering method shown in FIG. 1 , the method includes the following steps (step S102 - step S106 ): Step S102 , the client The terminal obtains the setting information of the third party to block the spam; wherein the third party is one or more devices other than the client; Step S104, the client updates the locally stored setting information according to the obtained setting information; Step S106 When the client receives the network information, the client filters the network information by using the updated setting information. Through the above steps, the client obtains the setting information of the third party intercepting the spam and updates the locally stored setting information, which is usually added to the locally stored setting information.
  • Step S102 can acquire setting information according to the set period to achieve the purpose of updating the local setting information in a period, and improve the efficiency of updating the local setting information.
  • the setting information of the third party intercepting the spam obtained by the client may be a blacklist and/or a spam processing rule.
  • the blacklist mechanism filters the sender of the information. When the blacklist is used, it detects whether the sender identifier of the received message is in the blacklist, so as to determine whether it is spam.
  • the spam processing rules can be the filtering conditions of spam, the filtering rules of spam, and the conditions for determining spam.
  • a spam signature database (such as key text, graphics/images, sounds, etc.) is built.
  • the signature database stores common spam features/keywords.
  • the client receives new information, the client first extracts The information feature/keyword in the information is compared with the feature database to determine whether the information is spam. Or the client detects the received message Whether it contains information features/keywords in the spam signature database to determine whether it is spam. If it is spam, the spam is filtered and intercepted, and is not directly displayed to the user.
  • the spam information can be deleted or stored in a special area.
  • the above client obtains setup information from one or more other devices, which may be a server or a designated client.
  • the client may obtain setting information of the third party intercepting the spam from the server, and the third party may include at least one of the following: a client on the network, a network user, and a server on the network.
  • the Weibo client subscribes to the garbage disposal rules provided by a security software company through the Weibo server, and can obtain the garbage disposal rules provided by the security software company server and can be updated regularly.
  • the client on the network can be a business client of the network user, such as a QQ client, an email client, a mobile terminal client, and the like.
  • the client can share the setting information of the third party to intercept the spam.
  • the QQ user obtains the setting information of the QQ friend client specified by the user through the client.
  • the client expands the blacklist by sharing the blacklist of the third party, and expands the blacklist to more comprehensively process spam.
  • the client extends the spam processing rules in the same way as the blacklist extension.
  • the expanded blacklist and/or spam processing rules can be stored locally, and the extended blacklist is stored locally.
  • the process flow is as shown in FIG. 2: Step S202: The client requests the server to obtain a third-party blacklist. Step S204 The server responds to the third-party blacklist of the request to the client. In step S206, the client adds the obtained third-party blacklist to the locally stored extended blacklist.
  • the expanded blacklist can be used to filter spam.
  • the client filters the received network information by using the updated setting information: First, the client detects whether the sender of the network information is blacklisted. Secondly, if the sender of the network information is in the blacklist, it is determined that the network information is spam. If the sender of the network information is not in the blacklist, the client detects whether there is any garbage in the network information.
  • the keyword matched by the information processing rule further, if the network information has a keyword matching the spam processing rule, the client determines that the network information is spam. For network information that cannot determine whether it is garbage information, it is usually simply processed according to normal information, or prompting the user to process, or detecting whether the information sender is in the white list, thereby judging whether it is friend information or strange information. If the client receives the network information forwarded by the forwarding party, it is assumed that the original sender of the network information is located in the blacklist of the client, and the forwarder is not in the blacklist. At this time, it is easy to cause a false positive, and the garbage is not filtered out.
  • the identifier of the forwarder and the identifier of the original sender may be carried in the network information, and the client detects whether the identifier of the forwarder and/or the identifier of the original sender is in the blacklist of the client, if forwarding If one of the identifier of the party and the identifier of the original sender is in the blacklist, it is determined that the sender of the network information is in the blacklist, and the network information is determined to be spam, and the spam is filtered out.
  • the method further includes: adding, by the sender or the server, the sender identifier and the original sender identifier of the network information in the information header of the network information; correspondingly, the client
  • the terminal uses the updated setting information to filter the network information, including: when the client receives the network information forwarded by the sender, using the setting information locally stored by the client, the sender identifier and the original in the information header of the network information.
  • the sender ID is filtered.
  • the blacklist may include at least one of the following methods: a phone number, an email address, a client ID (identity, identifier), a network user ID, a network address Uniform Resource Locator (URL), and a media access of the terminal.
  • Control Media Access Control, MAC for short
  • IP Internet Protocol
  • IMEI International Mobie Equipment Identity
  • IMEI TAC device model approval number
  • the present invention is suitable for filtering network information such as voice calls, SMS, MMS, EmaiK multimedia mail, timely messages, and network messages.
  • the embodiment also provides a forwarding mechanism, in which the information header of the forwarding information is newly set.
  • the sending direction of the receiving party to the network in the sending direction When the sending direction forwards the network information to the receiving party
  • the sender or the server adds the sender identifier and the original sender identifier of the network information to the information header of the network information, and forwards the network information after the identifier is added; when the receiver receives the network information forwarded by the sender,
  • the sender ID and the original sender ID in the header are filtered using the setting information stored locally by the receiver.
  • the setting information stored locally by the receiving party may be only the blacklist of the receiving party.
  • the blacklist of the receiving party may also be the blacklist extended by the foregoing method, that is, not only the blacklist of the receiving party but also the first blacklist.
  • the sender identifier in the header of the network information is the identifier of the user corresponding to the sender, and the original sender identifier includes the identifier of the user who forwarded the network information before the sender and the identifier of the original sender of the network information. Therefore, the forwarder that previously forwarded the network information is considered to be the original sender of the network information with respect to the current sender.
  • the addition of the sender identifier and the original sender identifier of the network information may be completed by the sender or by the sender/receiver server.
  • This embodiment further provides another method for information filtering, which may be implemented on the server side. As shown in FIG.
  • step S302 the server receives the request message for obtaining the setting information from the client.
  • step S304 the server adds the setting information of the third party intercepting the spam information to the storage area corresponding to the client local to the server; wherein the third party is a client One or more devices other than the terminal; Step S306, when the server forwards the network information to the client, the network information is filtered by using the setting information in the storage area.
  • the server After the server receives the request message for obtaining the setting information from the client, the server adds the setting information of the third party intercepting the spam information to the storage area corresponding to the client local to the server, and the server uses the setting information in the storage area to the network information. Filtering solves the problem of low efficiency of filtering spam in related technologies. This method expands the setting information of the client on the server, improves the success rate of filtering spam, and improves the user experience. If the client wants to obtain the setting information of another specified client, that is, the request message specifies the setting information of the client for the request, the server locally searches for the setting information corresponding to the specified client, and adds the found setting information to the client. The corresponding storage area on the server.
  • the server sends a request message for the setting information to the specified client, and receives the setting information of the specified client, and then adds the setting information to the corresponding storage area of the client on the server.
  • the client obtains the setting information of the specified client, expands the setting information of the server itself, and provides conditions for improving the success rate of filtering the spam.
  • the server forwards the request message of the setting information to the third-party server, and receives the setting information of the third-party server, and adds the setting information to the corresponding storage of the client on the server.
  • the setting information herein may also include: a blacklist and/or a spam processing rule.
  • the client expands the blacklist and/or spam processing rules by sharing the blacklist of the third party, and further augments the spam by augmenting the blacklist and/or spam processing rules.
  • the expanded blacklist and/or spam processing rules may be stored locally as shown above, or may be stored in the server.
  • the process of storing the expanded blacklist in the server is as shown in FIG. 4: Step S402, the client is in the server. Creating a blacklist on the first step; Step S404, the client sends a request message for obtaining a third-party blacklist to the server; Step S406: The server adds the third-party blacklist to the blacklist created by the client locally on the server.
  • the expanded blacklist can be used to filter spam.
  • the server uses the setting information in the storage area to filter the network information to be forwarded: First, the server detects whether the sender of the network information to be forwarded is in the blacklist; Secondly, if the sender of the network information is in the blacklist, the network information is determined to be spam. If the sender is not in the blacklist, the server detects whether the network information has a keyword matching the spam processing rule. If the network information has a keyword matching the spam processing rule, the server determines that the network information is spam.
  • the spam is intercepted to prevent the spam from being sent to the client.
  • For network information that cannot determine whether it is spam it is usually simply processed according to normal information, or prompting the user to process, or detecting whether the sender of the information is in the white list, thereby judging whether it is friend information or strange information.
  • the network information to be forwarded to the client by the server is the information forwarded by the forwarder, it is assumed that the original sender of the network information is located in the blacklist of the server, and the forwarder is not in the blacklist. The spam information is not filtered out.
  • the identifier of the forwarding party and the identifier of the original sender may be carried in the network information, and the server detects whether the identifier of the forwarding party and/or the identifier of the original sender is in the blacklist. If one of the identifier of the forwarder and the identifier of the original sender is in the blacklist, it is determined that the sender of the network information is in the blacklist, thereby determining that the network information is spam, and the server intercepts the spam, preventing the It is sent to the client.
  • this embodiment provides a client device for information filtering, which is used to implement the above embodiment.
  • the client device includes: an obtaining module 52, a storage module 54, and a filtering module 56.
  • the structure will be described below.
  • the obtaining module 52 is configured to obtain setting information of the third party intercepting the spam information, where the third party is one or more devices other than the client device, and the storage module 54 is connected to the obtaining module 52, and is configured to be configured according to Acquiring the setting information acquired by the module 52 to update the locally stored setting information;
  • the filtering module 56 connected to the storage module 54, is configured to filter the network information using the updated setting information stored locally by the storage module 54 when the network information is received.
  • the storage module 54 updates the locally stored setting information according to the setting information of the third-party intercepting spam information acquired by the obtaining module 52, and the filtering module 56 uses the locally stored updated setting information when receiving the network information. Filtering the network information solves the problem of low efficiency of filtering spam in related technologies. This method expands the setting information of the client, improves the success rate of filtering spam, and improves the user experience.
  • the obtaining module 52 may obtain, from the server or the designated client, setting information of the third party intercepting the spam, another structural block diagram of the information filtering client device as shown in FIG. 6, the client device includes the foregoing FIG.
  • the obtaining module 52 further includes a first obtaining unit 522, configured to acquire setting information of the third party intercepting the spam information from the server; or, the obtaining module 52 includes a second acquiring unit, configured to obtain the first acquiring unit from the specified client.
  • the three parties intercept the setting information of the spam, which is not shown in the figure.
  • the foregoing setting information may be a blacklist and/or a spam processing rule.
  • the obtaining module 52 further includes: a third obtaining unit, configured to obtain setting information of the third party intercepting the spam as a blacklist and/or garbage Information processing rule information.
  • the filtering module 56 uses the setting information to filter the received network information: First, it is detected whether the sender of the network information is in the blacklist; If the sender of the network information is in the blacklist, determining that the network information is spam, and if the sender of the network information is not in the blacklist, detecting whether the network information matches the spam processing rule. Keyword; If there is a matching keyword, it is determined that the network information is spam, and the spam is intercepted to achieve the purpose of filtering the spam. If the network information received by the client is forwarded by the forwarding party, the client device may detect whether the forwarder and the original sender of the network message are in the blacklist, as shown in FIG.
  • the filtering module 56 further includes: a blacklist detecting unit 562 and a determining unit 564.
  • the blacklist detecting unit 562 is configured to: when the setting information includes a blacklist, if the network information is information forwarded by the forwarding party, and the network information carries the identifier of the forwarding party and the identifier of the original sender, detecting the identifier of the forwarding party And/or whether the identifier of the original sender is in the blacklist; the determining unit 564 is connected to the blacklist detecting unit 562, and is set to be in the case that one of the identifier of the forwarding party and the identifier of the original sender is in the blacklist, The sender of the above network information is determined to be in the blacklist.
  • FIG. 8 is a structural block diagram of a server for information filtering according to an embodiment of the present invention.
  • the server includes: a request message receiving module 82, a setting information adding module 84, and a filtering module 86.
  • the request message receiving module 82 is configured to receive a request message for acquiring setting information from the client;
  • the setting information adding module 84 is connected to the request message receiving module 82, and is configured to add the setting information of the third party intercepting the spam to the local customer.
  • the setting information added by the module 84 in the storage area filters the network information.
  • the setting information adding module 84 adds the setting information of the third party intercepting the spam information to the storage area corresponding to the local client, and the filtering module 86 uses The setting information in the storage area filters the network information, and solves the problem of low efficiency of filtering the spam in the related art.
  • the request message receiving module 82 receives the request message from the client, and the request message for the client is the case of requesting the setting information of the specified client, and FIG. 9 shows another structural block diagram of the server for information filtering, except for the server.
  • the setting information adding module 84 further includes: a setting information searching unit 842 and a setting information adding unit 844. The structure will be described below.
  • the setting information searching unit 842 is configured to, in the case that the request message specifies the setting information of the client for the request, locally find the setting information corresponding to the specified client; the setting information adding unit 844 is connected to the setting information searching unit 842, and is set to be The setting information found by the setting information searching unit 842 is added to the storage area corresponding to the local client.
  • the foregoing setting information may be a blacklist and/or a spam processing rule.
  • the request message receiving module 82 further includes: a request message receiving unit, configured to receive the setting information from the client as a blacklist and/or garbage. Request message for information processing rules.
  • the filtering module 86 uses the setting information to filter the received network information: First, it is detected whether the sender of the network information is in the blacklist; If the sender of the network information is in the blacklist, determining that the network information is spam If the sender of the network information is not in the blacklist, it is detected whether there is a keyword matching the spam processing rule in the network information; if there is a matching keyword, determining that the network information is spam, intercepting the Spam to achieve the purpose of filtering spam.
  • the server may detect whether the forwarder and the original sender of the network message are in the blacklist, and another type of the server for filtering the information as shown in FIG.
  • the filtering module 86 further includes: a detecting unit 862 and a determining unit 864. The structure will be described below.
  • the detecting unit 862 is configured to: if the network information is information forwarded by the forwarder, and the network information carries the identifier of the forwarder and the identifier of the original sender, whether the identifier of the forwarder and/or the identifier of the original sender are detected In the above setting information (for example, blacklist); the determining unit 864 is connected to the detecting unit 862, and is configured to determine the network information if one of the identifier of the forwarding party and the identifier of the original sender is in the setting information. For spam.
  • Embodiment 1 When the receiver of the network information intercepts the received network information through the blacklist and/or the spam processing rule (that is, the setting information), sometimes the part of the spam information cannot be intercepted because the setting information of the receiver is small. In this case, for security reasons, the recipient expands its blacklist and/or spam processing rules by sharing third-party blacklists and/or spam processing rules (ie, third-party interception spam settings).
  • the network information sent by the sender is processed using the extended blacklist and/or spam processing rules.
  • the extended blacklist and/or spam processing rules can be stored locally on the client or on the server. The processing of these two storage methods has been described above and will not be described here.
  • FIG. 11 is a flowchart of a method for information filtering according to the first embodiment of the present invention.
  • the method includes the following steps (step S1102-step S1106): S1102: The social network client requests the social network server to obtain a blacklist/spam processing rule of the social friend, and/or a third party blacklist/spam processing rule; Step S1104: The social network server provides the social network client with the blacklist/spam processing rule and/or the third party blacklist/spam processing rule of the friend. Step S1106: The social network client responds to the blacklist/garbage of the server. Information processing rules are added to the locally expanded blacklist/spam rule base. In the above manner, the social network client has expanded its own blacklist/spam rule base.
  • FIG. 12 is a flowchart of a method for filtering information according to a second embodiment of the present invention.
  • the method includes the following steps (step S1202-step S1208): S1202.
  • the social network client creates a blacklist/spam rule rule base on the social network server. Users can create an empty blacklist/spam rule base on the server through the client (to facilitate the addition of extended blacklist/spam rules in the future;).
  • the social network client can also send the locally stored blacklist/spam processing rules to the server and add them to the blacklist/spam processing rule base corresponding to the social network client in the server.
  • Step S1204 The social network client requests the social network server to obtain a blacklist/spam processing rule and/or a third party blacklist/spam processing rule of the friend.
  • Step S1206 The social network server adds the blacklist/spam processing rule base of the friend and/or the third party blacklist/spam processing rule to the blacklist/spam processing rule base created by the user on the social network server.
  • Step S1208 The social network server processes the information sent to the social network client by using the blacklist/spam processing rule base, and then sends the information to the social network client. In the above manner, the social network client expands the blacklist/spam processing rule base created on the social network server. When there is network information sent to the social network client, the social network server is based on the extended black name.
  • the single/spam processing rule processes the network information, and then determines whether to send the network information to the social network client, thereby improving the success rate of filtering the spam and improving the user experience.
  • the third embodiment assumes that the network information received by the user is information forwarded by the user's friend, and the network information may belong to the spam for the user (for example, the original sender of the network information is located in the user's blacklist), but In this case, the network information cannot be intercepted based on the existing blacklist mechanism. Therefore, this embodiment proposes a method for filtering information, as shown in the flowchart of the method for filtering information shown in FIG. 13, the method includes the following steps (step S1302 - step S1304):
  • the information forwarder adds the original sender identifier of the information to be forwarded to the information
  • S1304 The receiver filters the information according to the forwarder identifier and/or the original sender identifier.
  • the forwarded information includes the identifier of the forwarder and the identifier of the original sender.
  • the receiver may process the information according to the forwarder identifier of the information and/or the original sender identifier. For example, although the forwarding party is a friend of the user, the original sender may be in the blacklist of the user.
  • the information may be intercepted by using the foregoing manner, thereby improving the success rate of filtering the spam and improving the user's Experience.
  • Embodiment 4 For the method described in the foregoing Embodiment 3, it is assumed that the network user has his own blacklist and a group of friends. When the friend forwards the information to the network user, since the friend is not in the blacklist, the user usually does not Filtering a friend's information, but if the information is not spam for his or her friends, it may be spam for the user, for example, the original sender of the information is in the user's blacklist, for this case, This embodiment will describe in detail the processing procedure for the receiver to process the information according to the forwarder identifier of the information and/or the original sender identifier. FIG.
  • Step S 1402 the information forwarder adds the original sender address of the information to be forwarded to the information.
  • Step S1404 The receiver processes the information according to the forwarder address and/or the original sender address in the information. For example, User B (mail address: b@test2.com) has a friend C (email address: c@test 3. com) forwards an email to User B (the original sender's address is a@testl.com) ), where a@testl. com is User B's blacklist.
  • the existing mail format (only some of the fields related to the present invention are given, and the specific header and body format can be consulted for related documents) as follows:
  • test2 " ⁇ b@test2.com> Cc:
  • test2 ⁇ b@test2. com> X-Transmit: " testl " ⁇ a@testl.com>
  • the server (test2) of the receiving user B receives the email, it extracts the email address and blacklist in the X-Transmit: domain.
  • the server (test2) of the receiving user B receives the email, it extracts the email address and blacklist in the X-Transmit: domain.
  • the server (test2) of the receiving user B receives the email, it extracts the email address and blacklist in the X-Transmit: domain.
  • the original sender's address a@testl.com is in the blacklist of user B, and the information is directly filtered and intercepted.
  • the embodiment of the present invention further provides a processing system for forwarding information. Referring to the structural block diagram of the processing system for forwarding information shown in FIG.
  • the system includes: The device 150 and the receiver device 160; the sender device 150 includes: an identifier adding module 152 configured to send the sender identifier corresponding to the sender device 150 and the original sender of the network information when forwarding the network information to the receiver device 160 The identifier is added to the information header of the network information.
  • the forwarding module 154 is connected to the identifier adding module 152, and is configured to forward the network information after the identifier adding module 152 adds the identifier to the receiver device 160.
  • the receiver device 160 includes: the receiving module 162.
  • the filtering module 164 is connected to the receiving module 162, and is configured to use the setting information stored locally by the receiving device 160 in the information header of the network information received by the receiving module 162.
  • the sender ID and the original sender ID are filtered.
  • the sender device 150 is connected to the receiver device 160.
  • the forwarding module 154 is connected to the receiver module 162.
  • the sender identifier in the information header of the network information is the identifier of the user corresponding to the sender device 150, and the original sender identifier includes the identifier of the user who forwards the network information before the sender device 150 and the initial transmission of the network information. The identity of the person.
  • the forwarder that forwarded the network information before is regarded as the original sender of the network information.
  • the addition of the sender identifier corresponding to the sender device 150 and the original sender identifier of the network information may be completed by the sender device 150 or may be completed by the server of the sender device 150.
  • the setting information in the system is the same as the above, and is a blacklist and/or spam processing rule.
  • the setting information may also be the setting information updated in the manner in the foregoing embodiment, and the specific updating manner is not described herein again.
  • the present invention filters the spam by expanding the blacklist and/or intercepting rules of the user by sharing the third party blacklist and/or spam processing rules. And the way to provide the original sender address of the information when forwarding the information to identify the spam, thereby improving the filtering success rate of the spam and improving the user experience.
  • the above modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices.
  • the computing device may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Abstract

Disclosed are an information filtering method, and a method, device, and system for processing forwarded information. The information filtering method comprises: a client obtaining setting information of a third party intercepting junk information; the client updating locally stored setting information according to the setting information; and upon receiving network information, the client using the updated setting information to filter the network information. According to the present invention, the client updates the locally stored setting information according to the obtained setting information of the third party intercepting junk information; upon receiving the network information, the client uses the updated setting information to filter the network information. The problem of low efficiency in junk information filtering in the relevant technology is solved. The means expands the setting information of the clients, increases the success rate of junk information filtering, and improves the user experience.

Description

信息过滤的方法、 转发信息的处理方法、 装置及系统 技术领域 本发明涉及通信领域, 具体而言, 涉及一种信息过滤的方法、 转发信息的处理方 法、 装置及系统。 背景技术 随着信息和通讯技术的迅速发展, 各种终端可以随时随地的在网络中传播各种信 息。 在此背景下, 垃圾信息也随之而来。 这些垃圾信息包括了各种情色类的视频、 图 片、 文学等"低俗内容", 赌博、 造假、 诈骗等各类违反道德、 法律法规的内容以及对 其他网络用户的诽谤、 不良评价等。 这些信息不但给广大人民群众的生活造成困扰, 也造成人们精神上的损失。 因此, 解决网络中垃圾信息的问题已经刻不容缓。 目前, 处理垃圾信息的方法主要有两种, 分别是基于用户黑名单过滤的方法以及 采取关键词和特征匹配的方法。前者的主要策略是:用户事先记录垃圾信息的主体(比 如垃圾信息的发起者), 并将其列入限制名单的方式,但是这种方法是发生在垃圾信息 已经成功发送之后, 并且可能需要接收方反馈相应信息才能确定该信息为垃圾信息。 另外由于单个用户的黑名单往往不全面, 不具备对变更后的垃圾信息主体进行处理的 能力。 后者的主要策略是: 预先建立一个垃圾信息的特征库, 当接收到新的信息时提 取信息中的关键词或者特征, 并将该关键词或者特征与特征库进行比对, 以此来断定 此信息是否为垃圾信息, 这种方法的不足之处是准确性不高, 容易造成误判且效率比 较低。 针对相关技术中过滤垃圾信息的效率较低的问题,目前尚未提出有效的解决方案。 发明内容 本发明提供了一种信息过滤的方法、 转发信息的处理方法、 装置及系统, 以至少 解决相关技术中过滤垃圾信息的效率较低的问题。 根据本发明的一个方面, 提供了一种信息过滤的方法, 该方法包括: 客户端获取 第三方拦截垃圾信息的设置信息, 该第三方是除客户端以外的其他一个或多个设备; 客户端根据该设置信息更新本地存储的设置信息; 当客户端接收到网络信息时, 客户 端使用更新后的上述设置信息对该网络信息进行过滤。 上述其他一个或多个设备为服务器或指定客户端。 上述设置信息包括: 黑名单和 /或垃圾信息处理规则。 当设置信息为黑名单和垃圾信息处理规则时, 客户端使用更新后的设置信息对网 络信息进行过滤包括: 客户端检测上述网络信息的发送方是否在黑名单中, 如果是, 确定该网络信息为垃圾信息; 如果否, 客户端检测该网络信息中是否有与垃圾信息处 理规则匹配的关键字; 如果有匹配的关键字, 客户端确定该网络信息为垃圾信息。 上述客户端接收的网络信息为发送方转发的网络信息时, 上述方法还包括: 发送 方或服务器将该发送方标识和该网络信息的原发送方标识添加在该网络信息的信息头 中; 相应地, 上述客户端使用更新后的设置信息对网络信息进行过滤包括: 客户端接 收到来自该发送方转发的网络信息时, 使用客户端本地存储的设置信息对该网络信息 的信息头中的该发送方标识和原发送方标识进行过滤。 根据本发明的另一个方面, 提供了一种信息过滤的方法, 包括: 服务器接收来自 客户端的获取设置信息的请求消息; 服务器将第三方拦截垃圾信息的设置信息添加到 服务器本地的客户端对应的存储区; 其中, 第三方是除客户端以外的其他一个或多个 设备; 服务器向客户端转发网络信息时, 使用存储区中的设置信息对网络信息进行过 滤。 上述请求消息为请求指定客户端的设置信息; 服务器将第三方拦截垃圾信息的设 置信息添加服务器本地的客户端对应的存储区包括: 服务器在服务器本地查找指定客 户端对应的设置信息,将查找到的设置信息添加到服务器本地的客户端对应的存储区。 上述设置信息包括: 黑名单和 /或垃圾信息处理规则。 当设置信息为黑名单和垃圾信息处理规则时, 服务器使用存储区中的设置信息对 网络信息进行过滤包括: 服务器检测网络信息的发送方是否在黑名单中, 如果是, 确 定网络信息为垃圾信息; 如果否, 服务器检测网络信息中是否有与垃圾信息处理规则 匹配的关键字; 如果有匹配的关键字, 服务器确定网络信息为垃圾信息。 当网络信息为来自转发方转发的信息时, 网络信息中携带有转发方的标识和原发 送方的标识; 上述服务器使用存储区中的设置信息对网络信息进行过滤包括: 服务器 检测转发方的标识和 /或原发送方的标识是否在设置信息中; 如果转发方的标识和原发 送方的标识中有一个在设置信息中, 则确定网络信息为垃圾信息。 根据本发明的再一方面,提供了一种信息过滤的客户端设备, 该客户端设备包括: 获取模块, 设置为获取第三方拦截垃圾信息的设置信息; 存储模块, 设置为将该设置 信息存储在本地; 过滤模块, 设置为当接收到网络信息时, 使用本地存储的上述设置 信息对该网络信息进行过滤。 上述获取模块还包括: 第三获取单元, 设置为获取第三方拦截垃圾信息的黑名单 和 /或垃圾信息处理规则, 将黑名单和 /或垃圾信息处理规则作为自身的设置信息。 根据本发明的又一方面, 提供了一种信息过滤的服务器, 该服务器包括: 请求消 息接收模块, 设置为接收来自客户端的获取设置信息的请求消息; 第一设置信息添加 模块, 设置为将第三方拦截垃圾信息的设置信息添加到本地的客户端对应的存储区; 过滤模块, 设置为向客户端转发网络信息时, 使用上述存储区中的设置信息对该网络 信息进行过滤。 上述请求消息接收模块包括: 请求消息接收单元, 设置为接收来自客户端的获取 设置信息为黑名单和 /或垃圾信息处理规则的请求消息。 上述过滤模块包括: 检测单元, 设置为网络信息为来自转发方转发的信息, 且网 络信息中携带有转发方的标识和原发送方的标识时,检测转发方的标识和 /或原发送方 的标识是否在设置信息中; 确定单元, 设置为在转发方的标识和原发送方的标识中有 一个在设置信息中的情况下, 确定网络信息为垃圾信息。 根据本发明的还一方面, 提供了一种转发信息的处理方法, 包括: 当发送方向接 收方转发网络信息时, 该发送方或服务器将发送方标识和该网络信息的原发送方标识 添加在该网络信息的信息头中, 转发网络信息; 接收方接收到来自发送方转发的网络 信息时, 使用接收方本地存储的设置信息对该网络信息的信息头中的上述发送方标识 和原发送方标识进行过滤。 根据本发明的又一方面, 提供了一种转发信息的处理系统, 包括: 发送方装置和 接收方装置; 其中, 该发送方装置包括: 标识添加模块, 设置为当向接收方装置转发 网络信息时, 将该发送方装置对应的发送方标识和网络信息的原发送方标识添加在网 络信息的信息头中; 转发模块, 设置为将标识添加模块添加标识后的网络信息转发给 接收方装置; 该接收方装置包括: 接收模块, 设置为接收到来自发送方装置转发的网 络信息; 过滤模块, 设置为使用该接收方装置本地存储的设置信息对接收模块接收的 网络信息的信息头中的发送方标识和原发送方标识进行过滤。 通过本发明, 根据第三方拦截垃圾信息的设置信息对网络信息进行过滤, 能够比 较准确地排除垃圾信息, 加快了本地设置信息的更新速度, 解决了相关技术中过滤垃 圾信息的效率较低的问题, 并提高过滤垃圾信息的成功率, 因此, 提升用户体验度。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发 明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在附图 中: 图 1是根据本发明实施例的信息过滤的方法的流程图; 图 2是根据本发明实施例的扩充的黑名单存储在本地的流程图; 图 3是根据本发明实施例的信息过滤的方法的另一种流程图; 图 4是根据本发明实施例的扩充的黑名单存储在服务器的流程图; 图 5是根据本发明实施例的信息过滤的客户端设备的结构框图; 图 6是根据本发明实施例的信息过滤的客户端设备的另一种结构框图; 图 7是根据本发明实施例的信息过滤的客户端设备的再一种结构框图; 图 8是根据本发明实施例的信息过滤的服务器的结构框图; 图 9是根据本发明实施例的信息过滤的服务器的另一种结构框图; 图 10是根据本发明实施例的信息过滤的服务器的再一种结构框图; 图 11是根据本发明实施例一的信息过滤的方法的流程图; 图 12是根据本发明实施例二的信息过滤的方法的流程图; 图 13是根据本发明实施例三的信息过滤的方法的流程图; 图 14是根据本发明实施例四的信息过滤的方法的流程图; 图 15是根据本发明实施例的转发信息的处理系统的结构框图。 具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在不冲突的 情况下, 本申请中的实施例及实施例中的特征可以相互组合。 本发明实施例考虑到基于用户自身的黑名单或过滤规则 (也可以称为垃圾信息处 理规则) 对垃圾信息进行过滤的方式, 容易造成误判且过滤垃圾信息的效率较低, 提 供了一种信息过滤的方法、 转发信息的处理方法、 装置 (如客户端设备和服务器) 及 系统。 下面通过实施例进行详细说明。 本实施例提供了一种信息过滤的方法, 该方法可以在客户端实现, 如图 1所示的 信息过滤的方法流程图, 该方法包括以下步骤 (步骤 S102-步骤 S106): 步骤 S102, 客户端获取第三方拦截垃圾信息的设置信息; 其中, 该第三方是除客 户端以外的其他一个或多个设备; 步骤 S104, 客户端根据获取到的上述设置信息更新本地存储的设置信息; 步骤 S106, 当客户端接收到网络信息时, 客户端使用更新后的设置信息对该网络 信息进行过滤。 通过上述步骤, 客户端获取第三方拦截垃圾信息的设置信息并更新本地存储的设 置信息, 通常是添加到本地原先存储的设置信息中。 当接收到网络信息时, 客户端使 用更新后的设置信息对该网络信息进行过滤, 解决了相关技术中过滤垃圾信息的效率 较低的问题, 该方式扩充了客户端的设置信息, 提高过滤垃圾信息的成功率, 提升用 户体验。 步骤 S102可以根据设定的周期获取设置信息,以达到周期的更新本地设置信息的 目的, 提高更新本地设置信息的效率。 上述客户端获取到的第三方拦截垃圾信息的设置信息,可以是黑名单和 /或垃圾信 息处理规则。 黑名单机制是对信息发送主体进行过滤, 采用黑名单时, 检测接收到的 信息的发送方标识是否在黑名单中, 以此来判断是否是垃圾信息。 垃圾信息处理规则 通常是对信息的内容进行过滤, 垃圾信息处理规则可以是垃圾信息的过滤条件、 垃圾 信息的过滤规则、垃圾信息的判定条件。例如建立垃圾信息特征库(如关键性的文字、 图形 /图像、 声音等), 该特征库中存储有常见的垃圾信息特征 /关键词, 当客户端接收 到新的信息时,客户端先提取该信息中的信息特征 /关键词,再将该信息特征 /关键词与 特征库进行对比, 以此来判断该信息是否是垃圾信息。 或者客户端检测接收到的信息 中是否包含垃圾信息特征库中的信息特征 /关键词, 以此来判断是否是垃圾信息。 如果 是垃圾信息, 则对该垃圾信息进行过滤、 拦截, 不直接显示给用户, 可以删除垃圾信 息或存放在专门区域。 上述客户端从其他一个或多个设备获取到设置信息, 该其他一个或多个设备可以 是服务器或指定客户端。客户端可以从服务器获取到第三方拦截垃圾信息的设置信息, 该第三方可以包括以下至少之一: 网络上的客户端、 网络用户、 网络上的服务器。 例 如, 微博客户端通过微博服务器订阅了某个安全软件公司提供的垃圾处理规则, 就可 以获取这个安全软件公司服务器提供的垃圾处理规则并可定期更新。 网络上的客户端 可以是网络用户的业务客户端, 比如 QQ客户端、 Email邮件客户端、移动终端客户端 等。 客户端可以共享第三方拦截垃圾信息的设置信息, 例如 QQ用户通过客户端获取 用户指定的 QQ好友客户端的设置信息。 客户端通过共享第三方的黑名单来扩充黑名单, 通过扩充黑名单, 从而更加全面 的处理垃圾信息。 客户端对垃圾信息处理规则的扩充方法与黑名单的扩充方法一样。 扩充后的黑名单和 /或垃圾信息处理规则可以存储在本地,扩充后的黑名单存储在本地 的处理流程如图 2所示: 步骤 S202, 客户端向服务器请求获取第三方黑名单; 步骤 S204, 服务器向客户端响应上述请求的第三方黑名单; 步骤 S206, 客户端将获取到的第三方黑名单添加到本地存储的扩充黑名单中。 扩充后的黑名单可用来对垃圾信息进行过滤, 过滤的具体方法可采用现有的技术 方法来解决, 这里不再赘述。 同样的, 扩充后的垃圾信息处理规则存储在本地的处理 流程也是如此, 在此不再赘述。 当上述存储在本地的设置信息为黑名单和垃圾信息处理规则时, 客户端使用更新 后的设置信息对接收到的网络信息进行过滤: 首先, 客户端检测该网络信息的发送方 是否在黑名单中; 其次, 如果该网络信息的发送方在此黑名单中, 则确定该网络信息 为垃圾信息, 如果该网络信息的发送方不在此黑名单中, 客户端检测网络信息中是否 有与上述垃圾信息处理规则匹配的关键字; 再者, 如果网络信息中有与上述垃圾信息 处理规则匹配的关键字, 客户端确定该网络信息为垃圾信息。 对于不能确定是否是垃 圾信息的网络信息, 通常简单地按正常信息处理, 或者提示用户处理, 或者检测信息 发送方是否在白名单中, 以此判断是好友信息还是陌生信息。 如果客户端接收到由转发方转发的网络信息, 假设该网络信息的原发送方位于客 户端的黑名单中, 而转发方不在该黑名单中, 此时很容易造成误判, 没有过滤掉此垃 圾信息, 对于这种情况, 可以在该网络信息中携带转发方的标识和原发送方的标识, 客户端检测转发方的标识和 /或原发送方的标识是否在客户端的黑名单中, 如果转发方 的标识和原发送方的标识中有一个在该黑名单中, 则确定该网络信息的发送方在黑名 单中, 即可判定该网络信息是垃圾信息, 并过滤掉该垃圾信息。 如果客户端接收的网络信息为发送方转发的网络信息, 上述方法还包括: 发送方 或服务器将发送方标识和网络信息的原发送方标识添加在网络信息的信息头中; 相应 地, 该客户端使用更新后的设置信息对网络信息进行过滤包括: 客户端接收到来自上 述发送方转发的网络信息时, 使用该客户端本地存储的设置信息对网络信息的信息头 中的发送方标识和原发送方标识进行过滤。 上述黑名单可以包括至少以下方式之一: 电话号码、 Email 地址、 客户端 ID (identity,标识), 网络用户 ID、网络地址统一资源定位符(Uniform Resource Locator, 简称为 URL)、 终端的媒体访问控制 (Media Access Control, 简称为 MAC) 地址、 终 端网协(Internet Protocol, 简称为 IP)地址、 国际移动装备识别码( International Mobie Equipment Identity,简称为 IMEI)号、 IMEI TAC (设备型号核准号码)号、终端 user-agent (用户代理) 参数等标识。 因此本发明适用于对语音呼叫、 SMS、 MMS、 EmaiK 多 媒体邮件、 及时消息、 网络消息等网络信息进行过滤。 本实施例还提供了一种转发机制, 该转发机制中对转发信息的信息头进行了新的 设置, 下面以发送方向接收方转发网络信息为例进行说明: 当发送方向接收方转发网 络信息时, 该发送方或服务器将发送方标识和网络信息的原发送方标识添加在该网络 信息的信息头中, 转发添加标识后的网络信息; 接收方接收到来自上述发送方转发的 网络信息时, 使用接收方本地存储的设置信息对信息头中的发送方标识和原发送方标 识进行过滤。 其中, 这里接收方本地存储的设置信息可以仅为其黑名单, 当然接收方 的黑名单也可以是通过上述方法扩充后的黑名单, 即不仅包括接收方自身的黑名单, 还可以包括从第三方获取的黑名单。 上述网络信息的信息头中的发送方标识为该发送方对应的用户的标识, 原发送方 标识包括该发送方之前转发该网络信息的用户的标识和该网络信息的最初发送者的标 识。 因此, 相对于当前的发送方而言, 之前转发该网络信息的转发方均视为该网络信 息的原发送方。 另外, 上述发送方标识和网络信息的原发送方标识的添加可以由上述 发送方完成, 也可以由发送方 /接收方的服务器完成。 本实施例还提供了另一种信息过滤的方法, 该方法可以在服务器侧实现, 如图 3 所示的是信息过滤方法的另一种流程图,该方法包括以下步骤(步骤 S302-步骤 S306): 步骤 S302, 服务器接收来自客户端的获取设置信息的请求消息; 步骤 S304,服务器将第三方拦截垃圾信息的设置信息添加到服务器本地的客户端 对应的存储区; 其中, 该第三方是除客户端以外的其他一个或多个设备; 步骤 S306, 服务器向客户端转发网络信息时, 使用上述存储区中的设置信息对该 网络信息进行过滤。 通过上述方法, 服务器接收来自客户端的获取设置信息的请求消息后, 将第三方 拦截垃圾信息的设置信息添加到服务器本地的客户端对应的存储区, 服务器使用该存 储区中的设置信息对网络信息进行过滤, 解决了相关技术中过滤垃圾信息的效率较低 的问题, 该方式扩充了客户端在服务器上的设置信息, 提高过滤垃圾信息的成功率, 提升用户体验。 如果客户端想要获取另一指定客户端的设置信息, 即上述请求消息为请求指定客 户端的设置信息, 服务器在本地查找该指定客户端对应的设置信息, 将查找到的设置 信息添加到客户端在服务器上的对应的存储区。 或者服务器向指定客户端发送该设置 信息的请求消息, 并接收指定客户端的设置信息, 再将设置信息添加到客户端在服务 器上的对应的存储区。 通过这种方式, 客户端获取到指定客户端的设置信息, 扩充了 自身在服务器上的设置信息, 为提高过滤垃圾信息的成功率提供了条件。 当请求的设置信息是第三方服务器的设置信息时, 服务器向第三方服务器转发该 设置信息的请求消息, 并接收第三方服务器的设置信息, 将设置信息添加到客户端在 服务器上的对应的存储区。 与上述实施例相同,这里的设置信息也可以包括:黑名单和 /或垃圾信息处理规则。 客户端通过共享第三方的黑名单来扩充黑名单和 /或垃圾信息处理规则,通过扩充 黑名单和 /或垃圾信息处理规则, 从而更加全面的处理垃圾信息。 扩充后的黑名单和 / 或垃圾信息处理规则可以如上所示存储在本地, 也可以存储在服务器, 扩充后的黑名 单存储在服务器的处理流程如图 4所示: 步骤 S402, 客户端在服务器上创建黑名单; 步骤 S404, 客户端向服务器发送获取第三方黑名单的请求消息; 步骤 S406,服务器将第三方黑名单添加到上述客户端在服务器本地创建的黑名单 中。 扩充后的黑名单可用来对垃圾信息进行过滤, 过滤的具体方法可采用现有的技术 方法来解决, 这里不再赘述。 同样的, 扩充后的垃圾信息处理规则存储在服务器的处 理流程也是如此, 在此不再赘述。 当上述设置信息为黑名单和垃圾信息处理规则时, 服务器使用存储区中的设置信 息对要转发的网络信息进行过滤: 首先, 服务器检测要转发的网络信息的发送方是否 在上述黑名单中; 其次, 如果该网络信息的发送方在黑名单中, 则确定该网络信息为 垃圾信息, 如果该发送方不在黑名单中, 服务器检测该网络信息中是否有与上述垃圾 信息处理规则匹配的关键字; 如果该网络信息中有与上述垃圾信息处理规则有匹配的 关键字, 服务器确定该网络信息是垃圾信息。 在服务器确定要转发的网络信息是垃圾 信息之后, 拦截该垃圾信息, 以免该垃圾信息被发送至客户端。 对于不能确定是否是 垃圾信息的网络信息, 通常简单地按正常信息处理, 或者提示用户处理, 或者检测信 息发送方是否在白名单中, 以此判断是好友信息还是陌生信息。 如果服务器将要转发给客户端的网络信息是由转发方转发的信息时, 假设该网络 信息的原发送方位于服务器的黑名单中, 而转发方不在该黑名单中, 此时很容易造成 误判, 没有过滤掉此垃圾信息, 对于这种情况, 可以在该网络信息中携带转发方的标 识和原发送方的标识, 服务器检测转发方的标识和 /或原发送方的标识是否在黑名单 中; 如果转发方的标识和原发送方的标识中有一个在黑名单中, 则确定网络信息的发 送方在黑名单中, 由此可判定该网络信息是垃圾信息, 服务器拦截该垃圾信息, 防止 将其发送至客户端。 对应于上述在客户端实现的信息过滤的方法, 本实施例提供了一种信息过滤的客 户端设备, 该设备用于实现上述实施例。 图 5是根据本发明实施例的信息过滤的客户 端设备的结构框图, 如图 5所示, 该客户端设备包括: 获取模块 52、 存储模块 54和 过滤模块 56。 下面对该结构进行说明。 获取模块 52, 设置为获取第三方拦截垃圾信息的设置信息; 其中, 该第三方是除 所述客户端设备以外的其他一个或多个设备; 存储模块 54, 连接至获取模块 52, 设置为根据获取模块 52获取的设置信息更新 本地存储的设置信息; 过滤模块 56, 连接至存储模块 54, 设置为当接收到网络信息时, 使用存储模块 54在本地存储的更新后的设置信息对该网络信息进行过滤。 通过上述客户端设备, 存储模块 54根据获取模块 52获取到的第三方拦截垃圾信 息的设置信息更新本地存储的设置信息, 过滤模块 56在接收到网络信息时, 使用本地 存储的更新后的设置信息对该网络信息进行过滤, 解决了相关技术中过滤垃圾信息的 效率较低的问题, 该方式扩充了客户端的设置信息, 提高过滤垃圾信息的成功率, 提 升用户体验。 上述获取模块 52 可以从服务器或指定客户端获取第三方拦截垃圾信息的设置信 息, 如图 6所示的信息过滤的客户端设备的另一种结构框图, 该客户端设备除了包括 上述图 5中的各个模块之外, 获取模块 52还包括第一获取单元 522, 设置为从服务器 获取第三方拦截垃圾信息的设置信息; 或者, 获取模块 52包括第二获取单元, 设置为 从指定客户端获取第三方拦截垃圾信息的设置信息, 该方式未在图中示出。 上述设置信息可以是黑名单和 /或垃圾信息处理规则, 对于这种情况, 上述获取模 块 52还包括: 第三获取单元, 设置为获取第三方拦截垃圾信息的设置信息为黑名单和 /或垃圾信息处理规则的信息。 当上述存储在本地的设置信息为黑名单和垃圾信息处理规则时,过滤模块 56使用 该设置信息对接收到的网络信息进行过滤: 首先, 检测该网络信息的发送方是否在黑 名单中; 其次, 如果该网络信息的发送方在此黑名单中, 则确定该网络信息为垃圾信 息, 如果该网络信息的发送方不在此黑名单中, 检测网络信息中是否有与上述垃圾信 息处理规则匹配的关键字; 如果有匹配的关键字, 确定该网络信息是垃圾信息, 则拦 截该垃圾信息, 以达到过滤垃圾信息的目的。 如果客户端接收到的网络信息是由转发方转发的信息时, 上述客户端设备可以检 测该网络消息的转发方和原发送方是否在黑名单中, 如图 7所示的信息过滤的客户端 设备的再一种结构框图, 该客户端设备除了包括上述图 6中的各个模块之外, 过滤模 块 56还包括: 黑名单检测单元 562和确定单元 564。 下面对该结构进行说明。 黑名单检测单元 562, 设置为当设置信息包括黑名单时, 如果网络信息为来自转 发方转发的信息, 且该网络信息中携带有转发方的标识和原发送方的标识, 检测转发 方的标识和 /或原发送方的标识是否在黑名单中; 确定单元 564,连接至黑名单检测单元 562, 设置为在转发方的标识和原发送方的 标识中有一个在黑名单中的情况下, 确定上述网络信息的发送方在黑名单中。 对应于上述在服务器实现的信息过滤的方法, 本实施例提供了一种信息过滤的服 务器, 该设备用于实现上述实施例。 图 8是根据本发明实施例的信息过滤的服务器的 结构框图, 如图 8所示, 该服务器包括: 请求消息接收模块 82、 设置信息添加模块 84 和过滤模块 86。 下面对该结构进行说明。 请求消息接收模块 82, 设置为接收来自客户端的获取设置信息的请求消息; 设置信息添加模块 84,连接至请求消息接收模块 82, 设置为将第三方拦截垃圾信 息的设置信息添加到本地的上述客户端对应的存储区; 其中, 该第三方是除客户端以 外的其他一个或多个设备; 过滤模块 86, 连接至设置信息添加模块 84, 设置为向客户端转发网络信息时, 使 用设置信息添加模块 84在存储区中添加的设置信息对该网络信息进行过滤。 通过上述服务器,请求消息接收模块 82接收来自客户端的获取设置信息的请求消 息后,设置信息添加模块 84将第三方拦截垃圾信息的设置信息添加到本地的客户端对 应的存储区, 过滤模块 86使用该存储区中的设置信息对网络信息进行过滤,解决了相 关技术中过滤垃圾信息的效率较低的问题, 该方式扩充了客户端的设置信息, 提高过 滤垃圾信息的成功率, 提升用户体验。 请求消息接收模块 82接收到的是来自客户端的请求消息,针对该客户端的请求消 息是请求指定客户端的设置信息的情况, 图 9示出了信息过滤的服务器的另一种结构 框图, 该服务器除了包括上述图 8中的各个模块之外, 设置信息添加模块 84还包括: 设置信息查找单元 842和设置信息添加单元 844。 下面对该结构进行说明。 设置信息查找单元 842, 设置为在请求消息为请求指定客户端的设置信息的情况 下, 在本地查找指定客户端对应的设置信息; 设置信息添加单元 844,连接至设置信息查找单元 842, 设置为将设置信息查找单 元 842查找到的设置信息添加到本地的客户端对应的存储区。 上述设置信息可以是黑名单和 /或垃圾信息处理规则, 对于这种情况, 上述请求消 息接收模块 82还包括: 请求消息接收单元, 设置为接收来自客户端的获取设置信息为 黑名单和 /或垃圾信息处理规则的请求消息。 当上述存储在本地的设置信息为黑名单和垃圾信息处理规则时,过滤模块 86使用 该设置信息对接收到的网络信息进行过滤: 首先, 检测该网络信息的发送方是否在黑 名单中; 其次, 如果该网络信息的发送方在此黑名单中, 则确定该网络信息为垃圾信 息, 如果该网络信息的发送方不在此黑名单中, 检测网络信息中是否有与上述垃圾信 息处理规则匹配的关键字; 如果有匹配的关键字, 确定该网络信息是垃圾信息, 则拦 截该垃圾信息, 以达到过滤垃圾信息的目的。 如果服务器将要转发的网络信息是由转发方转发的信息时, 上述服务器可以检测 该网络消息的转发方和原发送方是否在黑名单中,如图 10所示的信息过滤的服务器的 再一种结构框图,该服务器除了包括上述图 9中的各个模块之外,过滤模块 86还包括: 检测单元 862和确定单元 864。 下面对该结构进行说明。 检测单元 862, 设置为上述网络信息为来自转发方转发的信息, 且该网络信息中 携带有转发方的标识和原发送方的标识时,检测转发方的标识和 /或原发送方的标识是 否在上述设置信息 (例如黑名单) 中; 确定单元 864,连接至检测单元 862, 设置为在转发方的标识和原发送方的标识中 有一个在上述设置信息中的情况下, 确定该网络信息为垃圾信息。 下面结合优选实施例和附图对上述实施例的实现过程进行详细说明。 实施例一 在网络信息的接收方通过黑名单和 /或垃圾信息处理规则(即设置信息)对接收到 的网络信息进行拦截时, 有时由于接收方的设置信息较少, 不能拦截部分垃圾信息。 对于这种情况, 为了安全起见, 接收方通过共享第三方黑名单和 /或垃圾信息处理规则 (即第三方拦截垃圾信息的设置信息) 来扩充自己的黑名单和 /或垃圾信息处理规则, 再利用扩充的黑名单和 /或垃圾信息处理规则对发送方发送的网络信息进行处理。扩充 后的黑名单和 /或垃圾信息处理规则可以存储在客户端本地也可以存储在服务器上,这 两种存储方式的处理流程在前面已经进行了描述, 在此不再赘述。 对于上述场景, 比如社交网用户拥有自己的黑名单 /垃圾信息处理规则, 并且该社 交网用户在该社交网上有一群好友,其好友各自拥有他们自己的黑名单 /垃圾信息处理 规则, 该社交网用户可以利用自己的黑名单 /垃圾信息处理规则, 以及好友的黑名单 / 垃圾信息处理规则和 /或第三方黑名单 /垃圾信息处理规则来在本地过滤接收到的网络 信息。 针对这种场景, 本实施例提出的解决方法如图 11所示, 图 11是根据本发明实 施例一的信息过滤的方法的流程图, 该方法包括如下步骤 (步骤 S1102-步骤 S1106): 步骤 S1102, 社交网客户端向社交网服务器请求获取其社交好友的黑名单 /垃圾信 息处理规则, 和 /或第三方黑名单 /垃圾信息处理规则; 步骤 S1104, 社交网服务器向社交网客户端提供其好友的黑名单 /垃圾信息处理规 则和 /或第三方黑名单 /垃圾信息处理规则; 步骤 S1106, 社交网客户端将服务器响应的黑名单 /垃圾信息处理规则添加到在本 地扩充的黑名单 /垃圾信息处理规则库。 通过上述方式, 社交网客户端扩充了自身的黑名单 /垃圾信息处理规则库。 当有网 络信息发送给该社交网客户端时, 客户端根据扩充的黑名单 /垃圾信息处理规则来对该 网络信息进行处理, 从而提高了过滤垃圾信息的成功率, 提升了用户体验度。 实施例二 在上述实施例一中, 社交网用户可以利用自己的黑名单 /垃圾信息处理规则, 以及 好友的黑名单 /垃圾信息处理规则和 /或第三方黑名单 /垃圾信息处理规则在本地过滤接 收到的网络信息, 本实施例介绍了在与上述实施例一相同场景下, 社交网用户利用自 己的黑名单 /垃圾信息处理规则, 以及好友的黑名单 /垃圾信息处理规则和 /或第三方黑 名单 /垃圾信息处理规则在服务器过滤接收到的网络信息的方法, 图 12是根据本发明 实施例二的信息过滤的方法的流程图,该方法包括如下步骤(步骤 S1202-步骤 S1208 ): 步骤 S1202, 社交网客户端在社交网服务器上创建黑名单 /垃圾信息处理规则库。 用户通过客户端可以在服务器上创建一个空的黑名单 /垃圾信息处理规则库 (便于 以后添加扩充黑名单 /垃圾信息处理规则;)。 社交网客户端还可以将本地存储的黑名单 / 垃圾信息处理规则发送到服务器并添加到服务器中该社交网客户端对应的黑名单 /垃 圾信息处理规则库中。 步骤 S1204, 社交网客户端向社交网服务器请求获取其好友的黑名单 /垃圾信息处 理规则和 /或第三方黑名单 /垃圾信息处理规则。 步骤 S1206,社交网服务器将其好友的黑名单 /垃圾信息处理规则库和 /或第三方黑 名单 /垃圾信息处理规则添加到用户在社交网服务器创建的黑名单 /垃圾信息处理规则 库中。 步骤 S1208, 社交网服务器利用黑名单 /垃圾信息处理规则库对发送给社交网客户 端的信息进行处理, 然后将其发送给社交网客户端。 通过上述方式, 社交网客户端扩充了其在社交网服务器上创建的黑名单 /垃圾信息 处理规则库。 当有网络信息发送给该社交网客户端时, 社交网服务器根据扩充的黑名 单 /垃圾信息处理规则来对该网络信息进行处理,然后决定是否将该网络信息发送给社 交网客户端, 从而提高了过滤垃圾信息的成功率, 提升了用户体验度。 实施例三 假设用户接收到的网络信息是由用户的好友转发的信息, 而该网络信息对用户而 言可能属于垃圾信息(比如该网络信息的原发送方位于用户的黑名单中),但是对于这 种情况, 基于现有的黑名单机制是不能对该网络信息进行拦截的。 因此本实施例提出 了一种信息过滤的方法, 如图 13所示的信息过滤的方法的流程图, 该方法包括如下步 骤 (步骤 S1302-步骤 S1304):  TECHNICAL FIELD The present invention relates to the field of communications, and in particular to a method for filtering information, a method, a device, and a system for processing forwarding information. Background Art With the rapid development of information and communication technologies, various terminals can transmit various information in the network anytime and anywhere. In this context, spam is also coming. These spam messages include various erotic videos, pictures, literature and other "vulgar content", gambling, fraud, fraud and other content that violates ethics, laws and regulations, and embarrassing and bad evaluations of other online users. This information not only plagues the lives of the broad masses of the people, but also causes people's spiritual losses. Therefore, it is imperative to solve the problem of spam in the network. At present, there are two main methods for processing spam, which are based on the method of user blacklist filtering and the method of matching keywords and features. The main strategy of the former is: the user records the body of the spam in advance (such as the initiator of spam) and puts it in the restricted list, but this method occurs after the spam has been successfully sent and may need to be received. The party feedbacks the corresponding information to determine that the information is spam. In addition, since the blacklist of a single user is often incomplete, there is no ability to process the changed spam subject. The latter's main strategy is: Pre-establish a feature database of spam, extract the keywords or features in the information when new information is received, and compare the keyword or feature with the feature database to determine Whether this information is spam or not, the shortcoming of this method is that the accuracy is not high, it is easy to cause misjudgment and the efficiency is relatively low. In view of the low efficiency of filtering spam in the related art, an effective solution has not yet been proposed. SUMMARY OF THE INVENTION The present invention provides a method for information filtering, a method, device, and system for processing forwarding information to at least solve the problem of low efficiency of filtering spam in the related art. According to an aspect of the present invention, a method for filtering information is provided, the method comprising: obtaining, by a client, setting information of a third party intercepting spam, the third party being one or more devices other than the client; Updating the locally stored setting information according to the setting information; when the client receives the network information, the client filters the network information by using the updated setting information.  The other one or more of the above devices are servers or designated clients. The above setting information includes: blacklist and/or spam processing rules. When the setting information is a blacklist and a spam processing rule, the client uses the updated setting information to filter the network information, including: the client detects whether the sender of the network information is in the blacklist, and if yes, determines the network information. If the message is spam; if not, the client detects whether there is a keyword matching the spam processing rule in the network information; if there is a matching keyword, the client determines that the network information is spam. When the network information received by the client is the network information forwarded by the sender, the method further includes: adding, by the sender or the server, the sender identifier and the original sender identifier of the network information in the information header of the network information; The above-mentioned client uses the updated setting information to filter the network information, including: when the client receives the network information forwarded by the sender, the setting information stored locally by the client is used in the information header of the network information. The sender ID and the original sender ID are filtered. According to another aspect of the present invention, a method for information filtering is provided, including: receiving, by a server, a request message for acquiring setting information from a client; and adding, by the server, setting information of the third party intercepting the spam information to a client local to the server The storage area; wherein, the third party is one or more devices other than the client; when the server forwards the network information to the client, the network information is filtered by using the setting information in the storage area. The request message is configured to specify the setting information of the client. The server adds the setting information of the third party intercepting the spam to the storage area corresponding to the client local to the server. The server searches for the setting information corresponding to the specified client locally on the server, and the found information is found. The setting information is added to the storage area corresponding to the client local to the server. The above setting information includes: blacklist and/or spam processing rules. When the setting information is a blacklist and a spam processing rule, the server uses the setting information in the storage area to filter the network information, including: the server detects whether the sender of the network information is in the blacklist, and if yes, determines that the network information is spam. If not, the server detects whether there is a keyword matching the spam processing rule in the network information; if there is a matching keyword, the server determines that the network information is spam. When the network information is information forwarded by the forwarding party, the network information carries the identifier of the forwarder and the identifier of the original sender. The server uses the setting information in the storage area to filter the network information, including: the server detects the identifier of the forwarder. And/or whether the identifier of the original sender is in the setting information; if one of the identifier of the forwarder and the identifier of the original sender is in the setting information, it is determined that the network information is spam.  According to still another aspect of the present invention, a client device for information filtering is provided. The client device includes: an obtaining module configured to acquire setting information of a third party intercepting spam information; and a storage module configured to store the setting information Locally; the filtering module is configured to filter the network information by using the above-mentioned setting information stored locally when receiving the network information. The obtaining module further includes: a third obtaining unit, configured to obtain a blacklist and/or spam processing rule for the third party to intercept the spam, and use the blacklist and/or the spam processing rule as the setting information of the spam. According to still another aspect of the present invention, a server for information filtering is provided, the server comprising: a request message receiving module, configured to receive a request message for acquiring setting information from a client; a first setting information adding module, configured to be The setting information of the three-party interception spam is added to the storage area corresponding to the local client; and the filtering module is configured to filter the network information by using the setting information in the storage area when the network information is forwarded to the client. The request message receiving module includes: a request message receiving unit, configured to receive a request message that the obtaining setting information from the client is a blacklist and/or a spam processing rule. The filtering module includes: a detecting unit configured to: the network information is information forwarded by the forwarding party, and the network information carries the identifier of the forwarding party and the identifier of the original sender, and detects the identifier of the forwarding party and/or the original sender. Whether the identifier is in the setting information; the determining unit is configured to determine that the network information is spam in the case that one of the identifier of the forwarding party and the identifier of the original sender is in the setting information. According to still another aspect of the present invention, a method for processing forwarding information is provided, including: when a sending direction forwards network information to a receiving party, the sender or the server adds the sender identifier and the original sender identifier of the network information to In the information header of the network information, the network information is forwarded; when receiving the network information forwarded by the sender, the receiver uses the setting information stored locally by the receiver to use the sender identifier and the original sender in the header of the network information. The logo is filtered. According to still another aspect of the present invention, a processing system for forwarding information includes: a sender device and a receiver device; wherein the sender device includes: an identifier adding module configured to forward network information to the receiver device Adding the sender identifier corresponding to the sender device and the original sender identifier of the network information to the information header of the network information; the forwarding module is configured to forward the network information after the identifier adding module adds the identifier to the receiver device; The receiving device includes: a receiving module configured to receive network information forwarded from the transmitting device; and a filtering module configured to send the information in the header of the network information received by the receiving module using the setting information stored locally by the receiving device The party ID and the original sender ID are filtered.  Through the invention, the network information is filtered according to the setting information of the third party intercepting the spam information, the garbage information can be excluded more accurately, the update speed of the local setting information is accelerated, and the problem of low efficiency of filtering the spam in the related technology is solved. And improve the success rate of filtering spam, thus improving user experience. BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are set to illustrate,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, In the drawings: FIG. 1 is a flowchart of a method for information filtering according to an embodiment of the present invention; FIG. 2 is a flow chart of storing an extended blacklist locally according to an embodiment of the present invention; FIG. 3 is a flowchart according to an embodiment of the present invention. FIG. 4 is a flow chart of an extended blacklist stored in a server according to an embodiment of the present invention; FIG. 5 is a structural block diagram of a client device for information filtering according to an embodiment of the present invention; FIG. 6 is another structural block diagram of a client device for information filtering according to an embodiment of the present invention; FIG. 7 is a block diagram showing another structure of a client device for information filtering according to an embodiment of the present invention; FIG. 9 is a block diagram showing another structure of a server for information filtering according to an embodiment of the present invention; FIG. 10 is a block diagram showing another structure of a server for information filtering according to an embodiment of the present invention; Figure 11 is a flowchart of a method for information filtering according to a first embodiment of the present invention; Figure 12 is a method for filtering information according to a second embodiment of the present invention; FIG. 13 is a flowchart of a method for information filtering according to Embodiment 3 of the present invention; FIG. 14 is a flowchart of a method for information filtering according to Embodiment 4 of the present invention; FIG. 15 is a flowchart according to an embodiment of the present invention; A block diagram of the processing system for information. BEST MODE FOR CARRYING OUT THE INVENTION Hereinafter, the present invention will be described in detail with reference to the accompanying drawings. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict. The embodiment of the present invention considers a method for filtering spam based on a user's own blacklist or filtering rule (also referred to as a spam processing rule), which is easy to cause misjudgment and has low efficiency of filtering spam, and provides a kind of Method of information filtering, processing method of forwarding information, devices (such as client devices and servers), and systems. The details will be described below by way of examples. The embodiment provides a method for filtering information, which can be implemented on the client, as shown in the flowchart of the information filtering method shown in FIG. 1 , the method includes the following steps (step S102 - step S106 ): Step S102 , the client The terminal obtains the setting information of the third party to block the spam; wherein the third party is one or more devices other than the client; Step S104, the client updates the locally stored setting information according to the obtained setting information; Step S106 When the client receives the network information, the client filters the network information by using the updated setting information. Through the above steps, the client obtains the setting information of the third party intercepting the spam and updates the locally stored setting information, which is usually added to the locally stored setting information. When the network information is received, the client filters the network information by using the updated setting information, which solves the problem of low efficiency of filtering the spam in the related art, which expands the setting information of the client and improves the filtering of the spam. Success rate to enhance the user experience. Step S102 can acquire setting information according to the set period to achieve the purpose of updating the local setting information in a period, and improve the efficiency of updating the local setting information. The setting information of the third party intercepting the spam obtained by the client may be a blacklist and/or a spam processing rule. The blacklist mechanism filters the sender of the information. When the blacklist is used, it detects whether the sender identifier of the received message is in the blacklist, so as to determine whether it is spam. Spam processing rules Generally, the content of information is filtered. The spam processing rules can be the filtering conditions of spam, the filtering rules of spam, and the conditions for determining spam. For example, a spam signature database (such as key text, graphics/images, sounds, etc.) is built. The signature database stores common spam features/keywords. When the client receives new information, the client first extracts The information feature/keyword in the information is compared with the feature database to determine whether the information is spam. Or the client detects the received message Whether it contains information features/keywords in the spam signature database to determine whether it is spam. If it is spam, the spam is filtered and intercepted, and is not directly displayed to the user. The spam information can be deleted or stored in a special area. The above client obtains setup information from one or more other devices, which may be a server or a designated client. The client may obtain setting information of the third party intercepting the spam from the server, and the third party may include at least one of the following: a client on the network, a network user, and a server on the network. For example, the Weibo client subscribes to the garbage disposal rules provided by a security software company through the Weibo server, and can obtain the garbage disposal rules provided by the security software company server and can be updated regularly. The client on the network can be a business client of the network user, such as a QQ client, an email client, a mobile terminal client, and the like. The client can share the setting information of the third party to intercept the spam. For example, the QQ user obtains the setting information of the QQ friend client specified by the user through the client. The client expands the blacklist by sharing the blacklist of the third party, and expands the blacklist to more comprehensively process spam. The client extends the spam processing rules in the same way as the blacklist extension. The expanded blacklist and/or spam processing rules can be stored locally, and the extended blacklist is stored locally. The process flow is as shown in FIG. 2: Step S202: The client requests the server to obtain a third-party blacklist. Step S204 The server responds to the third-party blacklist of the request to the client. In step S206, the client adds the obtained third-party blacklist to the locally stored extended blacklist. The expanded blacklist can be used to filter spam. The specific method of filtering can be solved by using existing technical methods, and will not be described here. Similarly, the same is true for the processing process in which the expanded spam processing rules are stored locally, and will not be described here. When the above-mentioned local setting information is blacklist and spam processing rules, the client filters the received network information by using the updated setting information: First, the client detects whether the sender of the network information is blacklisted. Secondly, if the sender of the network information is in the blacklist, it is determined that the network information is spam. If the sender of the network information is not in the blacklist, the client detects whether there is any garbage in the network information. The keyword matched by the information processing rule; further, if the network information has a keyword matching the spam processing rule, the client determines that the network information is spam. For network information that cannot determine whether it is garbage information, it is usually simply processed according to normal information, or prompting the user to process, or detecting whether the information sender is in the white list, thereby judging whether it is friend information or strange information.  If the client receives the network information forwarded by the forwarding party, it is assumed that the original sender of the network information is located in the blacklist of the client, and the forwarder is not in the blacklist. At this time, it is easy to cause a false positive, and the garbage is not filtered out. Information, in this case, the identifier of the forwarder and the identifier of the original sender may be carried in the network information, and the client detects whether the identifier of the forwarder and/or the identifier of the original sender is in the blacklist of the client, if forwarding If one of the identifier of the party and the identifier of the original sender is in the blacklist, it is determined that the sender of the network information is in the blacklist, and the network information is determined to be spam, and the spam is filtered out. If the network information received by the client is the network information forwarded by the sender, the method further includes: adding, by the sender or the server, the sender identifier and the original sender identifier of the network information in the information header of the network information; correspondingly, the client The terminal uses the updated setting information to filter the network information, including: when the client receives the network information forwarded by the sender, using the setting information locally stored by the client, the sender identifier and the original in the information header of the network information. The sender ID is filtered. The blacklist may include at least one of the following methods: a phone number, an email address, a client ID (identity, identifier), a network user ID, a network address Uniform Resource Locator (URL), and a media access of the terminal. Control (Media Access Control, MAC for short) address, Internet Protocol (IP) address, International Mobie Equipment Identity (IMEI) number, IMEI TAC (device model approval number) No., terminal user-agent (user agent) parameters and other identifiers. Therefore, the present invention is suitable for filtering network information such as voice calls, SMS, MMS, EmaiK multimedia mail, timely messages, and network messages. The embodiment also provides a forwarding mechanism, in which the information header of the forwarding information is newly set. The following is an example of the sending direction of the receiving party to the network in the sending direction: When the sending direction forwards the network information to the receiving party The sender or the server adds the sender identifier and the original sender identifier of the network information to the information header of the network information, and forwards the network information after the identifier is added; when the receiver receives the network information forwarded by the sender, The sender ID and the original sender ID in the header are filtered using the setting information stored locally by the receiver. The setting information stored locally by the receiving party may be only the blacklist of the receiving party. The blacklist of the receiving party may also be the blacklist extended by the foregoing method, that is, not only the blacklist of the receiving party but also the first blacklist. The blacklist obtained by the three parties. The sender identifier in the header of the network information is the identifier of the user corresponding to the sender, and the original sender identifier includes the identifier of the user who forwarded the network information before the sender and the identifier of the original sender of the network information. Therefore, the forwarder that previously forwarded the network information is considered to be the original sender of the network information with respect to the current sender. In addition, the addition of the sender identifier and the original sender identifier of the network information may be completed by the sender or by the sender/receiver server.  This embodiment further provides another method for information filtering, which may be implemented on the server side. As shown in FIG. 3, another flow chart of the information filtering method includes the following steps (step S302-step S306). In step S302, the server receives the request message for obtaining the setting information from the client. In step S304, the server adds the setting information of the third party intercepting the spam information to the storage area corresponding to the client local to the server; wherein the third party is a client One or more devices other than the terminal; Step S306, when the server forwards the network information to the client, the network information is filtered by using the setting information in the storage area. After the server receives the request message for obtaining the setting information from the client, the server adds the setting information of the third party intercepting the spam information to the storage area corresponding to the client local to the server, and the server uses the setting information in the storage area to the network information. Filtering solves the problem of low efficiency of filtering spam in related technologies. This method expands the setting information of the client on the server, improves the success rate of filtering spam, and improves the user experience. If the client wants to obtain the setting information of another specified client, that is, the request message specifies the setting information of the client for the request, the server locally searches for the setting information corresponding to the specified client, and adds the found setting information to the client. The corresponding storage area on the server. Or the server sends a request message for the setting information to the specified client, and receives the setting information of the specified client, and then adds the setting information to the corresponding storage area of the client on the server. In this way, the client obtains the setting information of the specified client, expands the setting information of the server itself, and provides conditions for improving the success rate of filtering the spam. When the requested setting information is the setting information of the third-party server, the server forwards the request message of the setting information to the third-party server, and receives the setting information of the third-party server, and adds the setting information to the corresponding storage of the client on the server. Area. As in the above embodiment, the setting information herein may also include: a blacklist and/or a spam processing rule. The client expands the blacklist and/or spam processing rules by sharing the blacklist of the third party, and further augments the spam by augmenting the blacklist and/or spam processing rules. The expanded blacklist and/or spam processing rules may be stored locally as shown above, or may be stored in the server. The process of storing the expanded blacklist in the server is as shown in FIG. 4: Step S402, the client is in the server. Creating a blacklist on the first step; Step S404, the client sends a request message for obtaining a third-party blacklist to the server;  Step S406: The server adds the third-party blacklist to the blacklist created by the client locally on the server. The expanded blacklist can be used to filter spam. The specific method of filtering can be solved by using existing technical methods, and will not be described here. Similarly, the process of processing the expanded spam processing rules stored in the server is also the same, and will not be described here. When the setting information is a blacklist and a spam processing rule, the server uses the setting information in the storage area to filter the network information to be forwarded: First, the server detects whether the sender of the network information to be forwarded is in the blacklist; Secondly, if the sender of the network information is in the blacklist, the network information is determined to be spam. If the sender is not in the blacklist, the server detects whether the network information has a keyword matching the spam processing rule. If the network information has a keyword matching the spam processing rule, the server determines that the network information is spam. After the server determines that the network information to be forwarded is spam, the spam is intercepted to prevent the spam from being sent to the client. For network information that cannot determine whether it is spam, it is usually simply processed according to normal information, or prompting the user to process, or detecting whether the sender of the information is in the white list, thereby judging whether it is friend information or strange information. If the network information to be forwarded to the client by the server is the information forwarded by the forwarder, it is assumed that the original sender of the network information is located in the blacklist of the server, and the forwarder is not in the blacklist. The spam information is not filtered out. In this case, the identifier of the forwarding party and the identifier of the original sender may be carried in the network information, and the server detects whether the identifier of the forwarding party and/or the identifier of the original sender is in the blacklist. If one of the identifier of the forwarder and the identifier of the original sender is in the blacklist, it is determined that the sender of the network information is in the blacklist, thereby determining that the network information is spam, and the server intercepts the spam, preventing the It is sent to the client. Corresponding to the above method for filtering information implemented on the client, this embodiment provides a client device for information filtering, which is used to implement the above embodiment. FIG. 5 is a structural block diagram of a client device for information filtering according to an embodiment of the present invention. As shown in FIG. 5, the client device includes: an obtaining module 52, a storage module 54, and a filtering module 56. The structure will be described below. The obtaining module 52 is configured to obtain setting information of the third party intercepting the spam information, where the third party is one or more devices other than the client device, and the storage module 54 is connected to the obtaining module 52, and is configured to be configured according to Acquiring the setting information acquired by the module 52 to update the locally stored setting information;  The filtering module 56, connected to the storage module 54, is configured to filter the network information using the updated setting information stored locally by the storage module 54 when the network information is received. Through the client device, the storage module 54 updates the locally stored setting information according to the setting information of the third-party intercepting spam information acquired by the obtaining module 52, and the filtering module 56 uses the locally stored updated setting information when receiving the network information. Filtering the network information solves the problem of low efficiency of filtering spam in related technologies. This method expands the setting information of the client, improves the success rate of filtering spam, and improves the user experience. The obtaining module 52 may obtain, from the server or the designated client, setting information of the third party intercepting the spam, another structural block diagram of the information filtering client device as shown in FIG. 6, the client device includes the foregoing FIG. In addition to the respective modules, the obtaining module 52 further includes a first obtaining unit 522, configured to acquire setting information of the third party intercepting the spam information from the server; or, the obtaining module 52 includes a second acquiring unit, configured to obtain the first acquiring unit from the specified client. The three parties intercept the setting information of the spam, which is not shown in the figure. The foregoing setting information may be a blacklist and/or a spam processing rule. In this case, the obtaining module 52 further includes: a third obtaining unit, configured to obtain setting information of the third party intercepting the spam as a blacklist and/or garbage Information processing rule information. When the setting information stored locally is a blacklist and a spam processing rule, the filtering module 56 uses the setting information to filter the received network information: First, it is detected whether the sender of the network information is in the blacklist; If the sender of the network information is in the blacklist, determining that the network information is spam, and if the sender of the network information is not in the blacklist, detecting whether the network information matches the spam processing rule. Keyword; If there is a matching keyword, it is determined that the network information is spam, and the spam is intercepted to achieve the purpose of filtering the spam. If the network information received by the client is forwarded by the forwarding party, the client device may detect whether the forwarder and the original sender of the network message are in the blacklist, as shown in FIG. A further structural block diagram of the device, in addition to the various modules in FIG. 6 above, the filtering module 56 further includes: a blacklist detecting unit 562 and a determining unit 564. The structure will be described below. The blacklist detecting unit 562 is configured to: when the setting information includes a blacklist, if the network information is information forwarded by the forwarding party, and the network information carries the identifier of the forwarding party and the identifier of the original sender, detecting the identifier of the forwarding party And/or whether the identifier of the original sender is in the blacklist; the determining unit 564 is connected to the blacklist detecting unit 562, and is set to be in the case that one of the identifier of the forwarding party and the identifier of the original sender is in the blacklist, The sender of the above network information is determined to be in the blacklist.  Corresponding to the foregoing method for filtering information implemented by the server, the embodiment provides a server for information filtering, and the device is used to implement the foregoing embodiment. FIG. 8 is a structural block diagram of a server for information filtering according to an embodiment of the present invention. As shown in FIG. 8, the server includes: a request message receiving module 82, a setting information adding module 84, and a filtering module 86. The structure will be described below. The request message receiving module 82 is configured to receive a request message for acquiring setting information from the client; the setting information adding module 84 is connected to the request message receiving module 82, and is configured to add the setting information of the third party intercepting the spam to the local customer. The storage area corresponding to the end; wherein, the third party is one or more devices other than the client; the filtering module 86 is connected to the setting information adding module 84, and is set to use the setting information when the network information is forwarded to the client The setting information added by the module 84 in the storage area filters the network information. After the request message receiving module 82 receives the request message for obtaining the setting information from the client, the setting information adding module 84 adds the setting information of the third party intercepting the spam information to the storage area corresponding to the local client, and the filtering module 86 uses The setting information in the storage area filters the network information, and solves the problem of low efficiency of filtering the spam in the related art. This method expands the setting information of the client, improves the success rate of filtering the spam, and improves the user experience. The request message receiving module 82 receives the request message from the client, and the request message for the client is the case of requesting the setting information of the specified client, and FIG. 9 shows another structural block diagram of the server for information filtering, except for the server. In addition to the respective modules in FIG. 8 described above, the setting information adding module 84 further includes: a setting information searching unit 842 and a setting information adding unit 844. The structure will be described below. The setting information searching unit 842 is configured to, in the case that the request message specifies the setting information of the client for the request, locally find the setting information corresponding to the specified client; the setting information adding unit 844 is connected to the setting information searching unit 842, and is set to be The setting information found by the setting information searching unit 842 is added to the storage area corresponding to the local client. The foregoing setting information may be a blacklist and/or a spam processing rule. In this case, the request message receiving module 82 further includes: a request message receiving unit, configured to receive the setting information from the client as a blacklist and/or garbage. Request message for information processing rules. When the setting information stored locally is a blacklist and a spam processing rule, the filtering module 86 uses the setting information to filter the received network information: First, it is detected whether the sender of the network information is in the blacklist; If the sender of the network information is in the blacklist, determining that the network information is spam If the sender of the network information is not in the blacklist, it is detected whether there is a keyword matching the spam processing rule in the network information; if there is a matching keyword, determining that the network information is spam, intercepting the Spam to achieve the purpose of filtering spam. If the network information to be forwarded by the server is the information forwarded by the forwarder, the server may detect whether the forwarder and the original sender of the network message are in the blacklist, and another type of the server for filtering the information as shown in FIG. In addition to the various modules in FIG. 9 above, the filtering module 86 further includes: a detecting unit 862 and a determining unit 864. The structure will be described below. The detecting unit 862 is configured to: if the network information is information forwarded by the forwarder, and the network information carries the identifier of the forwarder and the identifier of the original sender, whether the identifier of the forwarder and/or the identifier of the original sender are detected In the above setting information (for example, blacklist); the determining unit 864 is connected to the detecting unit 862, and is configured to determine the network information if one of the identifier of the forwarding party and the identifier of the original sender is in the setting information. For spam. The implementation process of the above embodiment will be described in detail below in conjunction with the preferred embodiments and the accompanying drawings. Embodiment 1 When the receiver of the network information intercepts the received network information through the blacklist and/or the spam processing rule (that is, the setting information), sometimes the part of the spam information cannot be intercepted because the setting information of the receiver is small. In this case, for security reasons, the recipient expands its blacklist and/or spam processing rules by sharing third-party blacklists and/or spam processing rules (ie, third-party interception spam settings). The network information sent by the sender is processed using the extended blacklist and/or spam processing rules. The extended blacklist and/or spam processing rules can be stored locally on the client or on the server. The processing of these two storage methods has been described above and will not be described here. For the above scenario, for example, the social network user has his own blacklist/spam processing rule, and the social network user has a group of friends on the social network, and their friends each have their own blacklist/spam processing rules, the social network Users can use their blacklist/spam processing rules, as well as their blacklist/spam processing rules and/or third-party blacklist/spam processing rules to filter the received network information locally. For the scenario, the solution proposed in this embodiment is as shown in FIG. 11. FIG. 11 is a flowchart of a method for information filtering according to the first embodiment of the present invention. The method includes the following steps (step S1102-step S1106): S1102: The social network client requests the social network server to obtain a blacklist/spam processing rule of the social friend, and/or a third party blacklist/spam processing rule;  Step S1104: The social network server provides the social network client with the blacklist/spam processing rule and/or the third party blacklist/spam processing rule of the friend. Step S1106: The social network client responds to the blacklist/garbage of the server. Information processing rules are added to the locally expanded blacklist/spam rule base. In the above manner, the social network client has expanded its own blacklist/spam rule base. When the network information is sent to the social network client, the client processes the network information according to the extended blacklist/spam processing rule, thereby improving the success rate of filtering the spam and improving the user experience. Embodiment 2 In the foregoing Embodiment 1, the social network user can use the blacklist/spam processing rule of the user, and the blacklist/spam processing rule of the friend and/or the third party blacklist/spam processing rule to filter locally. The received network information, this embodiment describes that in the same scenario as the above embodiment 1, the social network user utilizes his own blacklist/spam processing rules, and the friend's blacklist/spam processing rules and/or third parties. FIG. 12 is a flowchart of a method for filtering information according to a second embodiment of the present invention. The method includes the following steps (step S1202-step S1208): S1202. The social network client creates a blacklist/spam rule rule base on the social network server. Users can create an empty blacklist/spam rule base on the server through the client (to facilitate the addition of extended blacklist/spam rules in the future;). The social network client can also send the locally stored blacklist/spam processing rules to the server and add them to the blacklist/spam processing rule base corresponding to the social network client in the server. Step S1204: The social network client requests the social network server to obtain a blacklist/spam processing rule and/or a third party blacklist/spam processing rule of the friend. Step S1206: The social network server adds the blacklist/spam processing rule base of the friend and/or the third party blacklist/spam processing rule to the blacklist/spam processing rule base created by the user on the social network server. Step S1208: The social network server processes the information sent to the social network client by using the blacklist/spam processing rule base, and then sends the information to the social network client. In the above manner, the social network client expands the blacklist/spam processing rule base created on the social network server. When there is network information sent to the social network client, the social network server is based on the extended black name. The single/spam processing rule processes the network information, and then determines whether to send the network information to the social network client, thereby improving the success rate of filtering the spam and improving the user experience. The third embodiment assumes that the network information received by the user is information forwarded by the user's friend, and the network information may belong to the spam for the user (for example, the original sender of the network information is located in the user's blacklist), but In this case, the network information cannot be intercepted based on the existing blacklist mechanism. Therefore, this embodiment proposes a method for filtering information, as shown in the flowchart of the method for filtering information shown in FIG. 13, the method includes the following steps (step S1302 - step S1304):
S1302, 信息转发方将要转发的信息的原发送方标识添加到该信息中; S1304, 接收方根据转发方标识和 /或原发送方标识来对信息进行过滤处理。 通过这种发送, 转发的信息包含转发方的标识和原发送方的标识, 接收方接收到 信息后, 可以根据信息的转发方标识和 /或原发送方标识来处理该信息。 例如尽管转发 方是用户的好友, 但原发送方可能在用户的黑名单内, 对于这种转发的信息, 可以利 用上述方式对其进行拦截, 从而提高了过滤垃圾信息的成功率, 提升用户的体验度。 实施例四 对于上述实施例三所描述的方法, 假设网络用户拥有自己的黑名单和一群好友, 当其好友向该网络用户转发信息时, 由于好友不在其黑名单中, 用户通常情况下不会 过滤好友的信息, 但是如果该信息对其好友来说不是垃圾信息, 却有可能对该用户来 说是垃圾信息, 比如该信息的原发送方位于该用户的黑名单中, 针对这种情况, 本实 施例将对接收方根据信息的转发方标识和 /或原发送方标识来处理该信息的处理过程 进行详细的描述,如图 14所示的是信息过滤的方法的流程图,该方法包括如下步骤 (步 骤 S 1402-步骤 S1404): 步骤 S1402, 信息转发方将要转发的信息的原发送方地址添加到该信息中。 步骤 S1404, 接收方根据该信息中转发方地址和 /或原发送方地址来对该信息进行 处理。 例如:用户 B (邮件地址为: b@test2. com)的好友 C (邮件地址为: c@ test 3. com) 向用户 B转发一封电子邮件(原发送方的地址为 a@testl. com), 其中 a@testl. com在 用户 B的黑名单内。 假设现有的邮件格式 (只给出了与本发明相关的部分域, 具体的 邮件头和邮件体格式可查阅相关的文档) 如下所示: S1302: The information forwarder adds the original sender identifier of the information to be forwarded to the information; S1304: The receiver filters the information according to the forwarder identifier and/or the original sender identifier. Through such transmission, the forwarded information includes the identifier of the forwarder and the identifier of the original sender. After receiving the information, the receiver may process the information according to the forwarder identifier of the information and/or the original sender identifier. For example, although the forwarding party is a friend of the user, the original sender may be in the blacklist of the user. For the forwarded information, the information may be intercepted by using the foregoing manner, thereby improving the success rate of filtering the spam and improving the user's Experience. Embodiment 4 For the method described in the foregoing Embodiment 3, it is assumed that the network user has his own blacklist and a group of friends. When the friend forwards the information to the network user, since the friend is not in the blacklist, the user usually does not Filtering a friend's information, but if the information is not spam for his or her friends, it may be spam for the user, for example, the original sender of the information is in the user's blacklist, for this case, This embodiment will describe in detail the processing procedure for the receiver to process the information according to the forwarder identifier of the information and/or the original sender identifier. FIG. 14 is a flowchart of a method for information filtering, and the method includes The following steps (step S 1402 - step S1404): Step S1402, the information forwarder adds the original sender address of the information to be forwarded to the information. Step S1404: The receiver processes the information according to the forwarder address and/or the original sender address in the information. For example, User B (mail address: b@test2.com) has a friend C (email address: c@test 3. com) forwards an email to User B (the original sender's address is a@testl.com) ), where a@testl. com is User B's blacklist. Assume the existing mail format (only some of the fields related to the present invention are given, and the specific header and body format can be consulted for related documents) as follows:
From: " test3 "<c@test3.com > From: " test3 "<c@test3.com >
To: " test2 "< b@test2. com> Cc: To: " test2 "< b@test2. com> Cc:
Subject: mail content Subject: mail content
Date: Thu, 25 Oct 2011 13:38:31 -0800 Date: Thu, 25 Oct 2011 13:38:31 -0800
MIME- Version: 1.0 MIME- Version: 1.0
Content-Type: multipart/mixed; Return-Path: c@ test3. com 对于这种情况, 可以采用如下方式来实施, 即在 From:域添加原发送方的邮件地 址, 则新的邮件格式为: Content-Type: multipart/mixed; Return-Path: c@ test3. com In this case, it can be implemented by adding the original sender's mail address in the From: field, and the new mail format is:
From: " test3 "<c@ test3.com > /" testl "<a@testl.com> From: " test3 "<c@ test3.com > /" testl "<a@testl.com>
To: " test2 "< b@test2.com> Cc: To: " test2 "< b@test2.com> Cc:
Subject: mail content Subject: mail content
Date: Thu, 25 Oct 2011 13:38:31 -0800 Date: Thu, 25 Oct 2011 13:38:31 -0800
MIME- Version: 1.0 MIME- Version: 1.0
Content-Type: multipart/mixed; Return-Path: c@ test3.com 当接收方用户 B (邮件地址为: b@test2. com)的服务器(test2)接收到该邮件后, 提取 From:域" /"后的原地址来与黑名单进行比较, 以此来对接收到的信息进行处理, 比如本实施例中经过比较可知原发送方的地址 a@testl. com在用户 B的黑名单内, 则 直接过滤并拦截该信息。 另外, 该步骤还可以采用如下方式来实施, 即在邮件头中添加一个自定义域 (以 X-开头)。 假如设定自定义域名为 X-Transmit, 则新的邮件格式为: Content-Type: multipart/mixed; Return-Path: c@ test3.com When the receiving user B (mail address: b@test2.com) receives the message, it extracts the From: field. The subsequent original address is compared with the blacklist to process the received information. For example, in the embodiment, the original sender's address a@testl.com is in the blacklist of user B. Filter and block this information directly. In addition, this step can also be implemented by adding a custom field (starting with X-) in the header. If the custom domain name is set to X-Transmit, the new message format is:
From: " test3 "<c@test3.com > From: " test3 "<c@test3.com >
To: " test2 "<b@test2. com> X-Transmit: " testl "<a@testl.com> To: " test2 "<b@test2. com> X-Transmit: " testl "<a@testl.com>
Cc: Cc:
Subject: mail content Date: Thu, 25 Oct 2011 13:38:31 -0800 MIME- Version: 1.0 Content-Type: multipart/mixed; Subject: mail content Date: Thu, 25 Oct 2011 13:38:31 -0800 MIME- Version: 1.0 Content-Type: multipart/mixed;
Return-Path: c@test3.com 当接收方用户 B (邮件地址为: b@test2. com)的服务器(test2)接收到该邮件后, 提取 X-Transmit:域中的邮件地址来与黑名单进行比较, 比如本实施例中经过比较可知 原发送方的地址 a@testl. com在用户 B的黑名单内, 则直接过滤并拦截该信息。 对应于上述实施例三和实施例四提供的方法, 本发明实施例还提供了一种转发信 息的处理系统, 参见图 15所示的转发信息的处理系统的结构框图, 该系统包括: 发送 方装置 150和接收方装置 160; 发送方装置 150包括: 标识添加模块 152, 设置为当向接收方装置 160转发网络 信息时, 将该发送方装置 150对应的发送方标识和网络信息的原发送方标识添加在网 络信息的信息头中; 转发模块 154, 与标识添加模块 152相连, 设置为将标识添加模 块 152添加标识后的网络信息转发给接收方装置 160; 接收方装置 160包括: 接收模块 162, 设置为接收到来自发送方装置 150转发的 网络信息; 过滤模块 164, 与接收模块 162相连, 设置为使用接收方装置 160本地存 储的设置信息对接收模块 162接收的网络信息的信息头中的发送方标识和原发送方标 识进行过滤。 上述发送方装置 150与接收方装置 160相连接,本实施例具体体现为转发模块 154 与接收模块 162相连接。 其中,网络信息的信息头中的发送方标识为该发送方装置 150对应的用户的标识, 原发送方标识包括该发送方装置 150之前转发该网络信息的用户的标识和该网络信息 的最初发送者的标识。 因此, 相对于当前的发送方而言, 之前转发该网络信息的转发 方均视作为该网络信息的原发送方。 另外, 上述发送方装置 150对应的发送方标识和 网络信息的原发送方标识的添加可以由上述发送方装置 150完成, 也可以由发送方装 置 150的服务器完成。 其中, 本系统中的设置信息与上述相同, 为黑名单和 /或垃圾信息处理规则。 该设 置信息也可以是采用上述实施例中的方式更新后的设置信息, 具体更新方式这里不再 赘述。 从以上的描述中可以看出, 针对相关技术中信息过滤方法的不足, 本发明通过 共享第三方黑名单和 /或垃圾信息处理规则来扩充用户的黑名单和 /或拦截规则来过滤 垃圾信息, 以及在转发信息时提供该信息的原发送方地址的方式来甄别垃圾信息, 从 而提高了垃圾信息的过滤成功率, 提升了用户的体验。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可以用通用 的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布在多个计算装置所 组成的网络上, 可选地, 它们可以用计算装置可执行的程序代码来实现, 从而, 可以 将它们存储在存储装置中由计算装置来执行, 并且在某些情况下, 可以以不同于此处 的顺序执行所示出或描述的步骤, 或者将它们分别制作成各个集成电路模块, 或者将 它们中的多个模块或步骤制作成单个集成电路模块来实现。 这样, 本发明不限制于任 何特定的硬件和软件结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技 术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的 任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。 Return-Path: c@test3.com When the server (test2) of the receiving user B (email address: b@test2.com) receives the email, it extracts the email address and blacklist in the X-Transmit: domain. For comparison, for example, in the embodiment, it can be known that the original sender's address a@testl.com is in the blacklist of user B, and the information is directly filtered and intercepted. Corresponding to the methods provided in the foregoing embodiment 3 and the fourth embodiment, the embodiment of the present invention further provides a processing system for forwarding information. Referring to the structural block diagram of the processing system for forwarding information shown in FIG. 15, the system includes: The device 150 and the receiver device 160; the sender device 150 includes: an identifier adding module 152 configured to send the sender identifier corresponding to the sender device 150 and the original sender of the network information when forwarding the network information to the receiver device 160 The identifier is added to the information header of the network information. The forwarding module 154 is connected to the identifier adding module 152, and is configured to forward the network information after the identifier adding module 152 adds the identifier to the receiver device 160. The receiver device 160 includes: the receiving module 162. And configured to receive the network information forwarded from the sender device 150; the filtering module 164 is connected to the receiving module 162, and is configured to use the setting information stored locally by the receiving device 160 in the information header of the network information received by the receiving module 162. The sender ID and the original sender ID are filtered. The sender device 150 is connected to the receiver device 160. In this embodiment, the forwarding module 154 is connected to the receiver module 162. The sender identifier in the information header of the network information is the identifier of the user corresponding to the sender device 150, and the original sender identifier includes the identifier of the user who forwards the network information before the sender device 150 and the initial transmission of the network information. The identity of the person. Therefore, relative to the current sender, the forwarder that forwarded the network information before is regarded as the original sender of the network information. Further, the addition of the sender identifier corresponding to the sender device 150 and the original sender identifier of the network information may be completed by the sender device 150 or may be completed by the server of the sender device 150. The setting information in the system is the same as the above, and is a blacklist and/or spam processing rule. The setting information may also be the setting information updated in the manner in the foregoing embodiment, and the specific updating manner is not described herein again. As can be seen from the above description, in view of the deficiencies of the information filtering methods in the related art, the present invention filters the spam by expanding the blacklist and/or intercepting rules of the user by sharing the third party blacklist and/or spam processing rules. And the way to provide the original sender address of the information when forwarding the information to identify the spam, thereby improving the filtering success rate of the spam and improving the user experience. Obviously, those skilled in the art should understand that the above modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein. The steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software. The above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Claims

权 利 要 求 书 Claims
1. 一种信息过滤的方法, 包括: 1. A method of information filtering, comprising:
客户端获取第三方拦截垃圾信息的设置信息; 其中, 所述第三方是除所述 客户端以外的其他一个或多个设备;  The client obtains setting information of the third party intercepting the spam; wherein the third party is one or more devices other than the client;
所述客户端根据获取到的所述设置信息更新本地存储的设置信息; 当所述客户端接收到网络信息时, 所述客户端使用更新后的所述设置信息 对所述网络信息进行过滤。  The client updates the locally stored setting information according to the obtained setting information. When the client receives the network information, the client filters the network information by using the updated setting information.
2. 根据权利要求 1所述的方法, 其中, 所述其他一个或多个设备为服务器或指定 客户端。 2. The method of claim 1, wherein the other one or more devices are servers or designated clients.
3. 根据权利要求 1或 2所述的方法, 其中, 所述设置信息包括: 黑名单和 /或垃圾 信息处理规则。 The method according to claim 1 or 2, wherein the setting information comprises: a blacklist and/or a spam processing rule.
4. 根据权利要求 3所述的方法, 其中, 当所述设置信息为黑名单和垃圾信息处理 规则时,所述客户端使用更新后的所述设置信息对所述网络信息进行过滤包括: 所述客户端检测所述网络信息的发送方是否在所述黑名单中, 如果是, 确 定所述网络信息为垃圾信息; 如果否, 所述客户端检测所述网络信息中是否有 与所述垃圾信息处理规则匹配的关键字; The method according to claim 3, wherein, when the setting information is a blacklist and a spam processing rule, the filtering, by the client, the network information by using the updated setting information, includes: Determining, by the client, whether the sender of the network information is in the blacklist, and if yes, determining that the network information is spam; if not, the client detecting whether the network information is related to the garbage Keywords that match the information processing rules;
如果有匹配的关键字, 所述客户端确定所述网络信息为垃圾信息。  If there is a matching keyword, the client determines that the network information is spam.
5. 根据权利要求 1所述的方法, 其中, 5. The method according to claim 1, wherein
所述客户端接收的所述网络信息为发送方转发的网络信息时, 所述方法还 包括: 所述发送方或服务器将所述发送方标识和所述网络信息的原发送方标识 添加在所述网络信息的信息头中;  When the network information received by the client is the network information forwarded by the sender, the method further includes: adding, by the sender or the server, the sender identifier and the original sender identifier of the network information In the information header of the network information;
所述客户端使用更新后的所述设置信息对所述网络信息进行过滤包括: 所 述客户端接收到来自所述发送方转发的网络信息时, 使用所述客户端本地存储 的设置信息对所述网络信息的信息头中的所述发送方标识和所述原发送方标识 进行过滤。  The filtering, by the client, the network information by using the updated setting information, includes: when the client receives the network information forwarded by the sender, using the setting information stored locally by the client The sender identifier and the original sender identifier in the information header of the network information are filtered.
6. 一种信息过滤的方法, 包括: 6. A method of information filtering, comprising:
服务器接收来自客户端的获取设置信息的请求消息; 所述服务器将第三方拦截垃圾信息的设置信息添加到所述服务器本地的所 述客户端对应的存储区; 其中, 所述第三方是除所述客户端以外的其他一个或 多个设备; The server receives a request message for obtaining setting information from the client; The server adds the setting information of the third party intercepting the spam to the storage area corresponding to the client local to the server; wherein the third party is one or more devices other than the client;
所述服务器向所述客户端转发网络信息时, 使用所述存储区中的设置信息 对所述网络信息进行过滤。 根据权利要求 6所述的方法, 其中, 所述请求消息为请求指定客户端的设置信 息; 所述服务器将第三方拦截垃圾信息的设置信息添加所述服务器本地的所述 客户端对应的存储区包括:  When the server forwards the network information to the client, the network information is filtered by using the setting information in the storage area. The method according to claim 6, wherein the request message is setting information specifying a client, and the server adds setting information of the third party intercepting spam to the storage area corresponding to the client local to the server, including :
所述服务器在所述服务器本地查找所述指定客户端对应的设置信息, 将查 找到的所述设置信息添加到所述服务器本地的所述客户端对应的存储区。 根据权利要求 6或 7所述的方法, 其中, 所述设置信息包括: 黑名单和 /或垃圾 信息处理规则。 根据权利要求 8所述的方法, 其中, 当所述设置信息为所述黑名单和所述垃圾 信息处理规则时, 所述服务器使用所述存储区中的设置信息对所述网络信息进 行过滤包括:  The server searches for the setting information corresponding to the specified client locally, and adds the found setting information to the storage area corresponding to the client local to the server. The method according to claim 6 or 7, wherein the setting information comprises: a blacklist and/or a spam processing rule. The method according to claim 8, wherein, when the setting information is the blacklist and the spam processing rule, the server filters the network information by using setting information in the storage area, including :
所述服务器检测所述网络信息的发送方是否在所述黑名单中, 如果是, 确 定所述网络信息为垃圾信息; 如果否, 所述服务器检测所述网络信息中是否有 与所述垃圾信息处理规则匹配的关键字;  The server detects whether the sender of the network information is in the blacklist, and if yes, determines that the network information is spam; if not, the server detects whether the network information is related to the spam Handling keywords that match the rules;
如果有匹配的关键字, 所述服务器确定所述网络信息为垃圾信息。 根据权利要求 6所述的方法, 其中, 当所述网络信息为来自转发方转发的信息时, 所述网络信息中携带有所述 转发方的标识和原发送方的标识;  If there is a matching keyword, the server determines that the network information is spam. The method according to claim 6, wherein, when the network information is information forwarded by a forwarding party, the network information carries an identifier of the forwarder and an identifier of the original sender;
所述服务器使用所述存储区中的设置信息对所述网络信息进行过滤包括: 所述服务器检测所述转发方的标识和 /或所述原发送方的标识是否在所述设置 信息中; 如果所述转发方的标识和所述原发送方的标识中有一个在所述设置信 息中, 则确定所述网络信息为垃圾信息。 The filtering, by the server, the network information by using the setting information in the storage area, includes: the server detecting whether the identifier of the forwarding party and/or the identifier of the original sender is in the setting information; One of the identifier of the forwarder and the identifier of the original sender is in the setting information, and the network information is determined to be spam.
11. 一种转发信息的处理方法, 包括: 11. A method for processing forwarding information, comprising:
当发送方向接收方转发网络信息时, 所述发送方或服务器将所述发送方标 识和所述网络信息的原发送方标识添加在所述网络信息的信息头中, 转发所述 网络信息;  When the sending direction forwards the network information to the receiving party, the sender or the server adds the sender identifier and the original sender identifier of the network information to the information header of the network information, and forwards the network information;
所述接收方接收到来自所述发送方转发的网络信息时, 使用所述接收方本 地存储的设置信息对所述网络信息的信息头中的所述发送方标识和所述原发送 方标识进行过滤。  When receiving the network information forwarded by the sender, the receiving party performs, by using the setting information locally stored by the receiver, the sender identifier and the original sender identifier in the information header of the network information. filter.
12. 一种信息过滤的客户端设备, 包括: 12. A client device for information filtering, comprising:
获取模块, 设置为获取第三方拦截垃圾信息的设置信息; 其中, 所述第三 方是除所述客户端设备以外的其他一个或多个设备;  An obtaining module, configured to obtain setting information of a third party intercepting spam; wherein the third party is one or more devices other than the client device;
存储模块, 设置为根据所述获取模块获取的所述设置信息更新本地存储的 设置信息;  a storage module, configured to update the locally stored setting information according to the setting information acquired by the obtaining module;
过滤模块, 设置为当接收到网络信息时, 使用所述存储模块在本地存储的 更新后的所述设置信息对所述网络信息进行过滤。  The filtering module is configured to filter the network information by using the updated setting information stored locally by the storage module when the network information is received.
13. 根据权利要求 12所述的客户端设备, 其中, 所述获取模块还包括: The client device according to claim 12, wherein the obtaining module further comprises:
第三获取单元,设置为获取第三方拦截垃圾信息的黑名单和 /或垃圾信息处 理规则, 将所述黑名单和 /或垃圾信息处理规则作为自身的设置信息。  The third obtaining unit is configured to obtain a blacklist and/or spam processing rule for the third party to intercept the spam, and use the blacklist and/or the spam processing rule as the setting information of the self.
14. 一种信息过滤的服务器, 包括: 14. A server for information filtering, comprising:
请求消息接收模块, 设置为接收来自客户端的获取设置信息的请求消息; 设置信息添加模块, 设置为将第三方拦截垃圾信息的设置信息添加到所述 服务器本地的所述客户端对应的存储区; 其中, 所述第三方是除所述客户端以 外的其他一个或多个设备;  a request message receiving module, configured to receive a request message for obtaining setting information from the client; a setting information adding module, configured to add setting information of the third party intercepting the spam information to a storage area corresponding to the client local to the server; Wherein the third party is one or more devices other than the client;
过滤模块, 设置为向所述客户端转发网络信息时, 使用所述设置信息添加 模块在所述存储区中添加的设置信息对所述网络信息进行过滤。  The filtering module is configured to filter the network information by using setting information added by the setting information adding module in the storage area when the network information is forwarded to the client.
15. 根据权利要求 14所述的服务器, 其中, 所述请求消息接收模块包括: The server according to claim 14, wherein the request message receiving module comprises:
请求消息接收单元, 设置为接收来自客户端的获取设置信息为黑名单和 / 或垃圾信息处理规则的请求消息。 The request message receiving unit is configured to receive a request message from the client to obtain the setting information as a blacklist and/or a spam processing rule.
16. 根据权利要求 14所述的服务器, 其中, 所述过滤模块包括: The server according to claim 14, wherein the filtering module comprises:
检测单元, 设置为所述网络信息为来自转发方转发的信息, 且所述网络信 息中携带有所述转发方的标识和原发送方的标识时,检测所述转发方的标识和 / 或所述原发送方的标识是否在所述设置信息中;  And detecting, by the detecting unit, that the network information is information forwarded by the forwarding party, and the network information carries the identifier of the forwarder and the identifier of the original sender, and detects the identifier and/or the identifier of the forwarder Determining whether the identity of the original sender is in the setting information;
确定单元, 设置为在所述转发方的标识和所述原发送方的标识中有一个在 所述设置信息中的情况下, 确定所述网络信息为垃圾信息。  And a determining unit, configured to determine that the network information is spam if one of the identifier of the forwarder and the identifier of the original sender is in the setting information.
17. 一种转发信息的处理系统, 包括: 发送方装置和接收方装置; 17. A processing system for forwarding information, comprising: a sender device and a receiver device;
所述发送方装置包括: 标识添加模块, 设置为当向接收方装置转发网络信 息时, 将所述发送方装置对应的发送方标识和所述网络信息的原发送方标识添 加在所述网络信息的信息头中; 转发模块, 设置为将所述标识添加模块添加标 识后的所述网络信息转发给所述接收方装置;  The sender device includes: an identifier adding module, configured to add a sender identifier corresponding to the sender device and an original sender identifier of the network information to the network information when forwarding network information to the receiver device In the information header; the forwarding module is configured to forward the network information after the identifier adding module adds the identifier to the receiver device;
所述接收方装置包括: 接收模块, 设置为接收到来自所述发送方装置转发 的网络信息; 过滤模块, 设置为使用所述接收方装置本地存储的设置信息对所 述接收模块接收的网络信息的信息头中的所述发送方标识和所述原发送方标识 进行过滤。  The receiving device includes: a receiving module, configured to receive network information forwarded by the sending device; and a filtering module configured to use the setting information locally stored by the receiving device to receive network information received by the receiving module The sender identifier and the original sender identifier in the information header are filtered.
PCT/CN2012/072319 2011-11-23 2012-03-14 Information filtering method, and method, device, and system for processing forwarded information WO2013075430A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110375849.3 2011-11-23
CN2011103758493A CN103139041A (en) 2011-11-23 2011-11-23 Method for filtering information and method, device and system for processing forwarded information

Publications (1)

Publication Number Publication Date
WO2013075430A1 true WO2013075430A1 (en) 2013-05-30

Family

ID=48469053

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/072319 WO2013075430A1 (en) 2011-11-23 2012-03-14 Information filtering method, and method, device, and system for processing forwarded information

Country Status (2)

Country Link
CN (1) CN103139041A (en)
WO (1) WO2013075430A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104079475A (en) * 2014-06-27 2014-10-01 北京奇虎科技有限公司 Message processing method and system
CN104284336A (en) * 2014-09-27 2015-01-14 无锡市恒通智能交通设施有限公司 Method for automatically blocking client-side junk information
CN111200556A (en) * 2016-02-24 2020-05-26 吴玉芳 Network picture viewing method
CN114866349A (en) * 2022-07-06 2022-08-05 深圳市永达电子信息股份有限公司 Network information filtering method

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105338017A (en) * 2014-06-30 2016-02-17 北京新媒传信科技有限公司 WEB defense method and system
CN105490824A (en) * 2015-12-09 2016-04-13 厦门光趣投资管理有限公司 Game server and mass message filtering method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101087259A (en) * 2006-06-07 2007-12-12 深圳市都护网络科技有限公司 A system for filtering spam in Internet and its implementation method
CN101090357A (en) * 2006-06-13 2007-12-19 珠海金山软件股份有限公司 E-mail system and method capable of preventing garbage E-mail
CN101635886A (en) * 2008-07-22 2010-01-27 北京光芒星空信息技术有限公司 Method for filtering spam short messages based on user selection

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7373385B2 (en) * 2003-11-03 2008-05-13 Cloudmark, Inc. Method and apparatus to block spam based on spam reports from a community of users
US7855651B2 (en) * 2006-04-07 2010-12-21 Cognetive Systems Incorporated System for monitoring and recording hand hygiene performance
CN101166160B (en) * 2006-10-20 2010-09-15 阿里巴巴集团控股有限公司 A method and system for filtering instant communication rubbish information
CN101217555A (en) * 2008-01-10 2008-07-09 厦门三五互联科技股份有限公司 An intelligent anti-waster and anti-virus gateway and the corresponding filtering method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101087259A (en) * 2006-06-07 2007-12-12 深圳市都护网络科技有限公司 A system for filtering spam in Internet and its implementation method
CN101090357A (en) * 2006-06-13 2007-12-19 珠海金山软件股份有限公司 E-mail system and method capable of preventing garbage E-mail
CN101635886A (en) * 2008-07-22 2010-01-27 北京光芒星空信息技术有限公司 Method for filtering spam short messages based on user selection

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104079475A (en) * 2014-06-27 2014-10-01 北京奇虎科技有限公司 Message processing method and system
CN104284336A (en) * 2014-09-27 2015-01-14 无锡市恒通智能交通设施有限公司 Method for automatically blocking client-side junk information
CN111200556A (en) * 2016-02-24 2020-05-26 吴玉芳 Network picture viewing method
CN111200556B (en) * 2016-02-24 2024-01-19 吴玉芳 Network picture viewing method
CN114866349A (en) * 2022-07-06 2022-08-05 深圳市永达电子信息股份有限公司 Network information filtering method

Also Published As

Publication number Publication date
CN103139041A (en) 2013-06-05

Similar Documents

Publication Publication Date Title
US20230124046A1 (en) System and method for determining and communicating presence information
US8769418B2 (en) Enhanced message handling
KR101511924B1 (en) Sender identification system and method
KR101117451B1 (en) Electronic message forwarding
JP7050354B2 (en) How to manage multiple profiles for a single account in an asynchronous messaging system, system and computer readable media
JP2016136769A (en) Methods and apparatus for providing messaging using voicemail
US8406792B2 (en) Message modification system and method
WO2013075430A1 (en) Information filtering method, and method, device, and system for processing forwarded information
WO2008040248A1 (en) A method and system for transmitting email and a push mail server
CN101115094B (en) Method for providing communication service and system and trigger device
US10104067B2 (en) Providing a masked short message service in a wireless network
JP2008524679A (en) Prevent unwanted messages
JP5363342B2 (en) System and method for filtering cellular telephone messages
WO2018006808A1 (en) Multimedia message forwarding method and system
WO2012152028A1 (en) Method and device for implementing terminal-based converged messaging service
WO2009024063A1 (en) A method, device and system for identifying service
KR100842868B1 (en) Spam short message blocking system using call back short message and spam short message blocking method using the same
US20100212011A1 (en) Method and system for spam reporting by reference
WO2012155652A1 (en) Communication method, net element and system of cross-social network
WO2011153772A1 (en) Method and system for obtaining multiple instant information
WO2012083598A1 (en) Method and apparatus for processing calling number
KR101600864B1 (en) A selective receiving method of e-mail
WO2012151811A1 (en) Method and device for processing multimedia message
TWI754561B (en) Instant messaging system and method thereof and computer readable medium
US8875231B1 (en) Communication privacy services

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12851822

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12851822

Country of ref document: EP

Kind code of ref document: A1